Extracting prog: 12m40.621262848s Minimizing prog: 2h20m19.520350447s Simplifying prog options: 0s Extracting C: 9m15.604674478s Simplifying C: 59m59.651609017s extracting reproducer from 1 programs testing a last program of every proc single: executing 1 programs separately with timeout 45s testing program (duration=45s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-splice-socket$nl_netfilter-sendmsg$NFT_BATCH-splice-sendmsg$NFT_BATCH-sendmsg$NFT_BATCH detailed listing: executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180100002100000000000000000000008500000075000000a50000002300000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000001c0)='mmap_lock_acquire_returned\x00', r0}, 0x10) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4, 0xf) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x0) sendmsg$NFT_BATCH(r1, 0x0, 0x0) sendmsg$NFT_BATCH(r1, 0x0, 0x84810) program did not crash single: failed to extract reproducer single: executing 1 programs separately with timeout 16m0s testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-splice-socket$nl_netfilter-sendmsg$NFT_BATCH-splice-sendmsg$NFT_BATCH-sendmsg$NFT_BATCH detailed listing: executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180100002100000000000000000000008500000075000000a50000002300000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000001c0)='mmap_lock_acquire_returned\x00', r0}, 0x10) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4, 0xf) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x0) sendmsg$NFT_BATCH(r1, 0x0, 0x0) sendmsg$NFT_BATCH(r1, 0x0, 0x84810) program crashed: INFO: task hung in _vm_unmap_aliases single: successfully extracted reproducer found reproducer with 8 syscalls minimizing guilty program testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-splice-socket$nl_netfilter-sendmsg$NFT_BATCH-splice-sendmsg$NFT_BATCH detailed listing: executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180100002100000000000000000000008500000075000000a50000002300000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000001c0)='mmap_lock_acquire_returned\x00', r0}, 0x10) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4, 0xf) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x0) sendmsg$NFT_BATCH(r1, 0x0, 0x0) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-splice-socket$nl_netfilter-sendmsg$NFT_BATCH-splice detailed listing: executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180100002100000000000000000000008500000075000000a50000002300000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000001c0)='mmap_lock_acquire_returned\x00', r0}, 0x10) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4, 0xf) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x0) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-splice-socket$nl_netfilter-sendmsg$NFT_BATCH detailed listing: executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180100002100000000000000000000008500000075000000a50000002300000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000001c0)='mmap_lock_acquire_returned\x00', r0}, 0x10) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4, 0xf) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, 0x0, 0x0) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-splice-socket$nl_netfilter detailed listing: executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180100002100000000000000000000008500000075000000a50000002300000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000001c0)='mmap_lock_acquire_returned\x00', r0}, 0x10) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4, 0xf) socket$nl_netfilter(0x10, 0x3, 0xc) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-splice detailed listing: executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180100002100000000000000000000008500000075000000a50000002300000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000001c0)='mmap_lock_acquire_returned\x00', r0}, 0x10) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4, 0xf) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN detailed listing: executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180100002100000000000000000000008500000075000000a50000002300000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000001c0)='mmap_lock_acquire_returned\x00', r0}, 0x10) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180100002100000000000000000000008500000075000000a50000002300000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, 0x0, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180100002100000000000000000000008500000075000000a50000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash extracting C reproducer testing compiled C program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases simplifying C reproducer testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:false Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases reproducing took 3h42m15.39793384s repro crashed as (corrupted=false): INFO: task kworker/1:0:23 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:0 state:D stack:0 pid:23 tgid:23 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df879d84 r8:00000002 r7:60000113 r6:df879d8c r5:8324a400 r4:8324a400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8324a400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df879e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853aefc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8324a400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb843000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a538c r4:857a5000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857a538c r4:830cd080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8324a400 r8:830cd0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:830cd080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd080 r8:8027ed34 r7:df819d50 r6:830cd100 r5:8324a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf879fb0 to 0xdf879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:830cb100 INFO: task kworker/1:0:23 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: b9f6c000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 INFO: task kworker/1:2:94 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:2 state:D stack:0 pid:94 tgid:94 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df9a9d84 r8:00000002 r7:60000013 r6:df9a9d8c r5:83376c00 r4:83376c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83376c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9a9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853abc00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83376c00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb79f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a478c r4:857a4400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857a478c r4:833a6600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83376c00 r8:833a662c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833a6600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833a6600 r8:8027ed34 r7:df879e60 r6:833a6680 r5:83376c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9a9fb0 to 0xdf9a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:833cdd00 INFO: task kworker/1:2:94 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: b9f6c000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 INFO: task kworker/0:2:3109 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:2 state:D stack:0 pid:3109 tgid:3109 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df9c1d84 r8:00000002 r7:60000113 r6:df9c1d8c r5:83933000 r4:83933000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83933000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9c1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b854c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83933000 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc41000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495df8c r4:8495dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495df8c r4:848bd400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83933000 r8:848bd42c r7:82804d40 r6:dddced40 r5:dddced60 r4:848bd400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848bd400 r8:8027ed34 r7:ec311e60 r6:848bd580 r5:83933000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9c1fb0 to 0xdf9c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:845ab100 INFO: task kworker/0:2:3109 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: b9f6c000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 INFO: task kworker/0:4:3110 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:4 state:D stack:0 pid:3110 tgid:3110 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ec435d84 r8:00000002 r7:60000113 r6:ec435d8c r5:838a2400 r4:838a2400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:838a2400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec435e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ac1b40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:838a2400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfce3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d78c r4:8495d400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d78c r4:848bd500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838a2400 r8:848bd52c r7:82804d40 r6:dddced40 r5:dddced60 r4:848bd500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848bd500 r8:8027ed34 r7:df9c1e60 r6:848bd480 r5:838a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec435fb0 to 0xec435ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846e0040 INFO: task kworker/0:4:3110 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: b9f6c000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 INFO: task kworker/1:3:3112 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:3 state:D stack:0 pid:3112 tgid:3112 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df9b5d84 r8:00000002 r7:60000113 r6:df9b5d8c r5:8324bc00 r4:8324bc00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8324bc00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9b5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853abd40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8324bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7cf000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a4b8c r4:857a4800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857a4b8c r4:846bfa00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8324bc00 r8:846bfa2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:846bfa00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846bfa00 r8:8027ed34 r7:df879e60 r6:848bd380 r5:8324bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9b5fb0 to 0xdf9b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8465b0c0 INFO: task kworker/1:3:3112 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: b9f6c000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 INFO: task kworker/0:5:3114 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:5 state:D stack:0 pid:3114 tgid:3114 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df9c5d84 r8:00000002 r7:60000113 r6:df9c5d8c r5:83b10000 r4:83b10000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83b10000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9c5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc8700 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83b10000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa81000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8424738c r4:84247000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8424738c r4:848bd300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b10000 r8:848bd32c r7:82804d40 r6:dddced40 r5:dddced60 r4:848bd300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848bd300 r8:8027ed34 r7:df9c1e60 r6:848bd700 r5:83b10000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9c5fb0 to 0xdf9c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848789c0 INFO: task kworker/0:5:3114 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: b9f6c000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 INFO: task kworker/0:6:3116 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:6 state:D stack:0 pid:3116 tgid:3116 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df9d5d84 r8:00000002 r7:60000113 r6:df9d5d8c r5:83b16000 r4:83b16000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83b16000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be7b40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83b16000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb3b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2cb8c r4:84b2c800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b2cb8c r4:848bd680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b16000 r8:848bd6ac r7:82804d40 r6:dddced40 r5:dddced60 r4:848bd680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848bd680 r8:8027ed34 r7:df9c5e60 r6:848bd600 r5:83b16000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9d5fb0 to 0xdf9d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8469abc0 INFO: task kworker/0:6:3116 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: b9f6c000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 INFO: task kworker/0:7:3118 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:7 state:D stack:0 pid:3118 tgid:3118 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df9edd84 r8:00000002 r7:60000113 r6:df9edd8c r5:844b8000 r4:844b8000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844b8000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9ede08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e9680 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844b8000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510138c r4:85101000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8510138c r4:848bd780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844b8000 r8:848bd7ac r7:82804d40 r6:dddced40 r5:dddced60 r4:848bd780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848bd780 r8:8027ed34 r7:df9d5e60 r6:846bf080 r5:844b8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9edfb0 to 0xdf9edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846c6000 INFO: task kworker/0:7:3118 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: b9f6c000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 INFO: task kworker/0:8:3121 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:8 state:D stack:0 pid:3121 tgid:3121 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa05d84 r8:00000002 r7:60000013 r6:dfa05d8c r5:83370000 r4:83370000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83370000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa05e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850da480 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83370000 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb5d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2f38c r4:84b2f000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b2f38c r4:848bd800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83370000 r8:848bd82c r7:82804d40 r6:dddced40 r5:dddced60 r4:848bd800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848bd800 r8:8027ed34 r7:df9ede60 r6:846bf900 r5:83370000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa05fb0 to 0xdfa05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846c6180 INFO: task kworker/0:8:3121 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: ba5d4000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 INFO: task kworker/0:9:3123 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:3123 tgid:3123 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa11d84 r8:00000002 r7:60000113 r6:dfa11d8c r5:83376000 r4:83376000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83376000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa11e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85189640 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83376000 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df991000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85036b8c r4:85036800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85036b8c r4:848bd880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83376000 r8:848bd8ac r7:82804d40 r6:dddced40 r5:dddced60 r4:848bd880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848bd880 r8:8027ed34 r7:df9ede60 r6:846bfa80 r5:83376000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa11fb0 to 0xdfa11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846c6240 INFO: task kworker/0:9:3123 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: ba5d4000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:10:3124 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:3124 tgid:3124 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa15d84 r8:00000002 r7:60000113 r6:dfa15d8c r5:83380000 r4:83380000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83380000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa15e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526a780 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83380000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa3f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d178c r4:852d1400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852d178c r4:848bd900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83380000 r8:848bd92c r7:82804d40 r6:dddced40 r5:dddced60 r4:848bd900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848bd900 r8:8027ed34 r7:df9ede60 r6:846bf580 r5:83380000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa15fb0 to 0xdfa15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846c6240 INFO: task kworker/0:10:3124 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: ba5d4000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:11:3125 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3125 tgid:3125 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa21d84 r8:00000002 r7:60000113 r6:dfa21d8c r5:83382400 r4:83382400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83382400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa21e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ffd00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83382400 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06c1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85103f8c r4:85103c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85103f8c r4:848bd980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83382400 r8:848bd9ac r7:82804d40 r6:dddced40 r5:dddced60 r4:848bd980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848bd980 r8:8027ed34 r7:dfa15e60 r6:846bf280 r5:83382400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa21fb0 to 0xdfa21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846c6240 INFO: task kworker/0:11:3125 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: ba5d4000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:12:3128 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3128 tgid:3128 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa31d84 r8:00000002 r7:60000113 r6:dfa31d8c r5:8325a400 r4:8325a400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8325a400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa31e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85216a80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8325a400 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e010d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84928b8c r4:84928800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84928b8c r4:848bda00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8325a400 r8:848bda2c r7:82804d40 r6:dddced40 r5:dddced60 r4:848bda00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848bda00 r8:8027ed34 r7:dfa15e60 r6:846bfb80 r5:8325a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa31fb0 to 0xdfa31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846c6580 INFO: task kworker/0:12:3128 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: ba5d4000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:13:3130 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:13 state:D stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa45d84 r8:00000002 r7:60000013 r6:dfa45d8c r5:8438bc00 r4:8438bc00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8438bc00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa45e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85318700 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8438bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9fd000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85344b8c r4:85344800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85344b8c r4:848bda80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8438bc00 r8:848bdaac r7:82804d40 r6:dddced40 r5:dddced60 r4:848bda80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848bda80 r8:8027ed34 r7:dfa15e60 r6:846bfb00 r5:8438bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa45fb0 to 0xdfa45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846c6800 INFO: task kworker/0:13:3130 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: ba5d4000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:14:3131 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:3131 tgid:3131 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa49d84 r8:00000002 r7:60000013 r6:dfa49d8c r5:8438c800 r4:8438c800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8438c800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa49e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85410740 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8438c800 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e08af000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84929b8c r4:84929800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84929b8c r4:848bdb00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8438c800 r8:848bdb2c r7:82804d40 r6:dddced40 r5:dddced60 r4:848bdb00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848bdb00 r8:8027ed34 r7:dfa45e60 r6:846bfc00 r5:8438c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa49fb0 to 0xdfa49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846c6800 INFO: task kworker/0:14:3131 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: ba5d4000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:15:3133 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:3133 tgid:3133 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa59d84 r8:00000002 r7:60000113 r6:dfa59d8c r5:84388000 r4:84388000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84388000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa59e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538c500 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84388000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd63000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d2f8c r4:852d2c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852d2f8c r4:848bdb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84388000 r8:848bdbac r7:82804d40 r6:dddced40 r5:dddced60 r4:848bdb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848bdb80 r8:8027ed34 r7:dfa49e60 r6:846bf380 r5:84388000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa59fb0 to 0xdfa59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846c6c00 INFO: task kworker/0:15:3133 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: ba5d4000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:16:3135 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:16 state:D stack:0 pid:3135 tgid:3135 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa65d84 r8:00000002 r7:60000113 r6:dfa65d8c r5:8438d400 r4:8438d400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8438d400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa65e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8489d680 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8438d400 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0705000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85495b8c r4:85495800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85495b8c r4:848bdc00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8438d400 r8:848bdc2c r7:82804d40 r6:dddced40 r5:dddced60 r4:848bdc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848bdc00 r8:8027ed34 r7:dfa49e60 r6:846bf480 r5:8438d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa65fb0 to 0xdfa65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846c6bc0 INFO: task kworker/0:16:3135 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: bbd02000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:17:3138 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:17 state:D stack:0 pid:3138 tgid:3138 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa75d84 r8:00000002 r7:60000113 r6:dfa75d8c r5:8338bc00 r4:8338bc00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8338bc00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa75e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ae680 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8338bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84922b8c r4:84922800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84922b8c r4:848bdc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8338bc00 r8:848bdcac r7:82804d40 r6:dddced40 r5:dddced60 r4:848bdc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848bdc80 r8:8027ed34 r7:dfa65e60 r6:846bfd00 r5:8338bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa75fb0 to 0xdfa75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846c6cc0 INFO: task kworker/0:17:3138 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: bbd02000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:18:3139 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:18 state:D stack:0 pid:3139 tgid:3139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa7dd84 r8:00000002 r7:60000113 r6:dfa7dd8c r5:8338b000 r4:8338b000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8338b000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa7de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aa1400 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8338b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb14d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b938c r4:854b9000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854b938c r4:848bdd00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8338b000 r8:848bdd2c r7:82804d40 r6:dddced40 r5:dddced60 r4:848bdd00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848bdd00 r8:8027ed34 r7:dfa75e60 r6:846bfd80 r5:8338b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa7dfb0 to 0xdfa7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846c6fc0 INFO: task kworker/0:18:3139 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: bc041000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:19:3141 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:19 state:D stack:0 pid:3141 tgid:3141 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa71d84 r8:00000002 r7:60000113 r6:dfa71d8c r5:8438e000 r4:8438e000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8438e000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa71e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85560c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8438e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1af000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c478c r4:854c4400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854c478c r4:848bdd80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8438e000 r8:848bddac r7:82804d40 r6:dddced40 r5:dddced60 r4:848bdd80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848bdd80 r8:8027ed34 r7:dfa75e60 r6:848bde00 r5:8438e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa71fb0 to 0xdfa71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848e8180 INFO: task kworker/0:19:3141 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: bc279000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:20:3145 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:20 state:D stack:0 pid:3145 tgid:3145 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df9ddd84 r8:00000002 r7:60000113 r6:df9ddd8c r5:83b03000 r4:83b03000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83b03000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9dde08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855b8f80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83b03000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa67000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b44b8c r4:84b44800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b44b8c r4:848bde80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b03000 r8:848bdeac r7:82804d40 r6:dddced40 r5:dddced60 r4:848bde80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848bde80 r8:8027ed34 r7:dfa75e60 r6:848bdf00 r5:83b03000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846cf280 INFO: task kworker/0:20:3145 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: bc480000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:21:3146 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:21 state:D stack:0 pid:3146 tgid:3146 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df9e9d84 r8:00000002 r7:60000113 r6:df9e9d8c r5:840ec800 r4:840ec800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840ec800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbec00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840ec800 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e053d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84923b8c r4:84923800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84923b8c r4:848bdf80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840ec800 r8:848bdfac r7:82804d40 r6:dddced40 r5:dddced60 r4:848bdf80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848bdf80 r8:8027ed34 r7:df9dde60 r6:830cd780 r5:840ec800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e9fb0 to 0xdf9e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846cf280 INFO: task kworker/0:21:3146 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: bc889000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:22:3149 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:22 state:D stack:0 pid:3149 tgid:3149 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa91d84 r8:00000002 r7:60000113 r6:dfa91d8c r5:840e9800 r4:840e9800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840e9800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa91e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf5b00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840e9800 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8492b78c r4:8492b400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8492b78c r4:830cd300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840e9800 r8:830cd32c r7:82804d40 r6:dddced40 r5:dddced60 r4:830cd300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd300 r8:8027ed34 r7:df9e9e60 r6:830cd280 r5:840e9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa91fb0 to 0xdfa91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846cf300 INFO: task kworker/0:22:3149 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: bc889000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:23:3150 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:23 state:D stack:0 pid:3150 tgid:3150 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfaa5d84 r8:00000002 r7:60000113 r6:dfaa5d8c r5:840eec00 r4:840eec00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840eec00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852003c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840eec00 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf05000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85207b8c r4:85207800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85207b8c r4:848f2000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840eec00 r8:848f202c r7:82804d40 r6:dddced40 r5:dddced60 r4:848f2000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848f2000 r8:8027ed34 r7:dfa91e60 r6:848f2080 r5:840eec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa5fb0 to 0xdfaa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846cf440 INFO: task kworker/0:23:3150 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: bc8b5000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:24:3151 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:24 state:D stack:0 pid:3151 tgid:3151 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa9dd84 r8:00000002 r7:60000113 r6:dfa9dd8c r5:840e8000 r4:840e8000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840e8000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa9de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf5fc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840e8000 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa7f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8492bb8c r4:8492b800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8492bb8c r4:848f2100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840e8000 r8:848f212c r7:82804d40 r6:dddced40 r5:dddced60 r4:848f2100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848f2100 r8:8027ed34 r7:dfaa5e60 r6:848f2180 r5:840e8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa9dfb0 to 0xdfa9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846cf440 INFO: task kworker/0:24:3151 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: bccb8000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:25:3155 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:25 state:D stack:0 pid:3155 tgid:3155 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfab1d84 r8:00000002 r7:60000113 r6:dfab1d8c r5:840ed400 r4:840ed400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840ed400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fcc00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840ed400 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8ed000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85770b8c r4:85770800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85770b8c r4:848f2200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840ed400 r8:848f222c r7:82804d40 r6:dddced40 r5:dddced60 r4:848f2200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848f2200 r8:8027ed34 r7:dfaa5e60 r6:848f2280 r5:840ed400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab1fb0 to 0xdfab1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846cf680 INFO: task kworker/0:25:3155 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: bd120000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:26:3156 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:26 state:D stack:0 pid:3156 tgid:3156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfac5d84 r8:00000002 r7:60000113 r6:dfac5d8c r5:840ee000 r4:840ee000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840ee000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ae440 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840ee000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec403000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856d8f8c r4:856d8c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856d8f8c r4:848f2300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840ee000 r8:848f232c r7:82804d40 r6:dddced40 r5:dddced60 r4:848f2300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848f2300 r8:8027ed34 r7:dfab1e60 r6:848f2380 r5:840ee000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfac5fb0 to 0xdfac5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846cf680 INFO: task kworker/0:26:3156 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: bd38e000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:27:3158 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:27 state:D stack:0 pid:3158 tgid:3158 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfacdd84 r8:00000002 r7:60000113 r6:dfacdd8c r5:84116000 r4:84116000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84116000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfacde08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8583cdc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84116000 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb13f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856da78c r4:856da400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856da78c r4:848f2400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84116000 r8:848f242c r7:82804d40 r6:dddced40 r5:dddced60 r4:848f2400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848f2400 r8:8027ed34 r7:dfac5e60 r6:848f2480 r5:84116000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfacdfb0 to 0xdfacdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846cfd40 INFO: task kworker/0:27:3158 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: bd8a8000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:28:3161 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:28 state:D stack:0 pid:3161 tgid:3161 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfae1d84 r8:00000002 r7:60000113 r6:dfae1d8c r5:84116c00 r4:84116c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84116c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857adc80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84116c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb62f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856d9b8c r4:856d9800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856d9b8c r4:848f2500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84116c00 r8:848f252c r7:82804d40 r6:dddced40 r5:dddced60 r4:848f2500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848f2500 r8:8027ed34 r7:dfacde60 r6:848f2580 r5:84116c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae1fb0 to 0xdfae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846cfbc0 INFO: task kworker/0:28:3161 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: bd8a8000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:29:3162 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:29 state:D stack:0 pid:3162 tgid:3162 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfab9d84 r8:00000002 r7:60000113 r6:dfab9d8c r5:84718000 r4:84718000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84718000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84398fc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84718000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb111000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848f438c r4:848f4000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:848f438c r4:848f2600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84718000 r8:848f262c r7:82804d40 r6:dddced40 r5:dddced60 r4:848f2600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848f2600 r8:8027ed34 r7:dfacde60 r6:848f2680 r5:84718000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab9fb0 to 0xdfab9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846cfd80 INFO: task kworker/0:29:3162 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: bdbab000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:30:3164 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:30 state:D stack:0 pid:3164 tgid:3164 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfaedd84 r8:00000002 r7:60000113 r6:dfaedd8c r5:84718c00 r4:84718c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84718c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaede08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8585b5c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84718c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaad000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85866b8c r4:85866800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85866b8c r4:848f2700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84718c00 r8:848f272c r7:82804d40 r6:dddced40 r5:dddced60 r4:848f2700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848f2700 r8:8027ed34 r7:dfab9e60 r6:848f2780 r5:84718c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaedfb0 to 0xdfaedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846cfe80 INFO: task kworker/0:30:3164 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: bdf5b000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:31:3165 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:31 state:D stack:0 pid:3165 tgid:3165 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb01d84 r8:00000002 r7:60000113 r6:dfb01d8c r5:84719800 r4:84719800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84719800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb01e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858f5740 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84719800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e1000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9a5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8492e38c r4:8492e000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8492e38c r4:848f2880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84719800 r8:848f28ac r7:82804d40 r6:dddced40 r5:dddced60 r4:848f2880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848f2880 r8:8027ed34 r7:dfab9e60 r6:848f2900 r5:84719800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb01fb0 to 0xdfb01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84902040 INFO: task kworker/0:31:3165 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: bdf5b000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:32:3168 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:32 state:D stack:0 pid:3168 tgid:3168 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfaf5d84 r8:00000002 r7:60000113 r6:dfaf5d8c r5:8471a400 r4:8471a400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8471a400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854825c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8471a400 r7:00000000 r6:83018000 r5:00001000 r4:7f13d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5f1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848f5f8c r4:848f5c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:848f5f8c r4:848f2980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8471a400 r8:848f29ac r7:82804d40 r6:dddced40 r5:dddced60 r4:848f2980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848f2980 r8:8027ed34 r7:dfb01e60 r6:848f2a00 r5:8471a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf5fb0 to 0xdfaf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84902200 INFO: task kworker/0:32:3168 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: be1f8000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:33:3169 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:33 state:D stack:0 pid:3169 tgid:3169 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb05d84 r8:00000002 r7:60000113 r6:dfb05d8c r5:8471b000 r4:8471b000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8471b000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb05e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85482c00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8471b000 r7:00000000 r6:83018000 r5:00001000 r4:7f119000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6a3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848f6b8c r4:848f6800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:848f6b8c r4:848f2a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8471b000 r8:848f2aac r7:82804d40 r6:dddced40 r5:dddced60 r4:848f2a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848f2a80 r8:8027ed34 r7:dfb01e60 r6:848f2b00 r5:8471b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb05fb0 to 0xdfb05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84902200 INFO: task kworker/0:33:3169 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: be367000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:34:3172 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:34 state:D stack:0 pid:3172 tgid:3172 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb0dd84 r8:00000002 r7:60000113 r6:dfb0dd8c r5:8471bc00 r4:8471bc00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8471bc00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb0de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858f5b40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8471bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f11d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae9d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85484b8c r4:85484800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85484b8c r4:848f2b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8471bc00 r8:848f2bac r7:82804d40 r6:dddced40 r5:dddced60 r4:848f2b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848f2b80 r8:8027ed34 r7:dfb01e60 r6:848f2c00 r5:8471bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb0dfb0 to 0xdfb0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849026c0 INFO: task kworker/0:34:3172 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: be747000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:35:3174 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:35 state:D stack:0 pid:3174 tgid:3174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb21d84 r8:00000002 r7:60000113 r6:dfb21d8c r5:8471c800 r4:8471c800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8471c800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb21e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85915900 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8471c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e5000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3d3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85485b8c r4:85485800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85485b8c r4:848f2c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8471c800 r8:848f2cac r7:82804d40 r6:dddced40 r5:dddced60 r4:848f2c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848f2c80 r8:8027ed34 r7:dfb0de60 r6:848f2d00 r5:8471c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb21fb0 to 0xdfb21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84902640 INFO: task kworker/0:35:3174 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: be747000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:36:3176 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:36 state:D stack:0 pid:3176 tgid:3176 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb41d84 r8:00000002 r7:60000113 r6:dfb41d8c r5:840f6000 r4:840f6000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840f6000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb41e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85548b80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840f6000 r7:00000000 r6:83018000 r5:00001000 r4:7f207000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8f7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8492ef8c r4:8492ec00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8492ef8c r4:848f2d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840f6000 r8:848f2dac r7:82804d40 r6:dddced40 r5:dddced60 r4:848f2d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848f2d80 r8:8027ed34 r7:dfb21e60 r6:846bfe80 r5:840f6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb41fb0 to 0xdfb41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84902800 INFO: task kworker/0:36:3176 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: beccf000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:37:3178 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:37 state:D stack:0 pid:3178 tgid:3178 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb4dd84 r8:00000002 r7:60000113 r6:dfb4dd8c r5:8338ec00 r4:8338ec00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8338ec00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb4de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856743c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8338ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f313000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecce5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858adb8c r4:858ad800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858adb8c r4:848f2e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8338ec00 r8:848f2e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:848f2e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848f2e00 r8:8027ed34 r7:dfb41e60 r6:846bff00 r5:8338ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb4dfb0 to 0xdfb4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84902940 INFO: task kworker/0:37:3178 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: befa5000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:38:3179 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:38 state:D stack:0 pid:3179 tgid:3179 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb51d84 r8:00000002 r7:60000113 r6:dfb51d8c r5:83388c00 r4:83388c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83388c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb51e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e69c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83388c00 r7:00000000 r6:83018000 r5:00001000 r4:7f2b1000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbc5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8592d38c r4:8592d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8592d38c r4:848f2e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83388c00 r8:848f2eac r7:82804d40 r6:dddced40 r5:dddced60 r4:848f2e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848f2e80 r8:8027ed34 r7:dfb4de60 r6:846bff80 r5:83388c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb51fb0 to 0xdfb51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84902940 INFO: task kworker/0:38:3179 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: bf63c000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:39:3184 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:39 state:D stack:0 pid:3184 tgid:3184 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb6dd84 r8:00000002 r7:60000113 r6:dfb6dd8c r5:840f4800 r4:840f4800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840f4800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb6de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85674c40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840f4800 r7:00000000 r6:83018000 r5:00001000 r4:7f2c9000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb37b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8594178c r4:85941400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8594178c r4:848f2f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840f4800 r8:848f2f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:848f2f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848f2f00 r8:8027ed34 r7:dfb4de60 r6:846bfc80 r5:840f4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb6dfb0 to 0xdfb6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84902d80 INFO: task kworker/0:39:3184 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: bf63c000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:40:3186 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:40 state:D stack:0 pid:3186 tgid:3186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb61d84 r8:00000002 r7:60000113 r6:dfb61d8c r5:83b09800 r4:83b09800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83b09800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb61e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b86d80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83b09800 r7:00000000 r6:83018000 r5:00001000 r4:7f313000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb72b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859cab8c r4:859ca800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859cab8c r4:848f2f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b09800 r8:848f2fac r7:82804d40 r6:dddced40 r5:dddced60 r4:848f2f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848f2f80 r8:8027ed34 r7:dfb6de60 r6:846bf680 r5:83b09800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb61fb0 to 0xdfb61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84902d80 INFO: task kworker/0:40:3186 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: bf9d5000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:41:3187 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:41 state:D stack:0 pid:3187 tgid:3187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb71d84 r8:00000002 r7:60000013 r6:dfb71d8c r5:848c8000 r4:848c8000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848c8000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb71e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85402d40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848c8000 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec87d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85cd4f8c r4:85cd4c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85cd4f8c r4:8491c000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848c8000 r8:8491c02c r7:82804d40 r6:dddced40 r5:dddced60 r4:8491c000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8491c000 r8:8027ed34 r7:dfb61e60 r6:846bf880 r5:848c8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb71fb0 to 0xdfb71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84902d80 INFO: task kworker/0:41:3187 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: bfd22000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:4:3190 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:4 state:D stack:0 pid:3190 tgid:3190 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb2dd84 r8:00000002 r7:60000013 r6:dfb2dd8c r5:848c8c00 r4:848c8c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848c8c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb2de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853abe40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848c8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb821000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a4f8c r4:857a4c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857a4f8c r4:846bf780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848c8c00 r8:846bf7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:846bf780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846bf780 r8:8027ed34 r7:df879e60 r6:846bf800 r5:848c8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb2dfb0 to 0xdfb2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8490fe80 INFO: task kworker/1:4:3190 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c0060000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:5:3192 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:5 state:D stack:0 pid:3192 tgid:3192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb81d84 r8:00000002 r7:60000113 r6:dfb81d8c r5:848c9800 r4:848c9800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848c9800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb81e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85827040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848c9800 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb999000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a5b8c r4:857a5800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857a5b8c r4:846bf700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848c9800 r8:846bf72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:846bf700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846bf700 r8:8027ed34 r7:df879e60 r6:84697c80 r5:848c9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb81fb0 to 0xdfb81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8490fec0 INFO: task kworker/1:5:3192 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c0060000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:6:3195 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:6 state:D stack:0 pid:3195 tgid:3195 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb89d84 r8:00000002 r7:60000113 r6:dfb89d8c r5:848ca400 r4:848ca400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848ca400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb89e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85827140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848ca400 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9b5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a5f8c r4:857a5c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857a5f8c r4:84697f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ca400 r8:84697f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84697f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84697f00 r8:8027ed34 r7:dfb81e60 r6:838c1700 r5:848ca400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb89fb0 to 0xdfb89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8490fec0 INFO: task kworker/1:6:3195 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c0532000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:7:3196 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:7 state:D stack:0 pid:3196 tgid:3196 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb95d84 r8:00000002 r7:60000113 r6:dfb95d8c r5:848cb000 r4:848cb000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848cb000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb95e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85827340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848cb000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebad3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a678c r4:857a6400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857a678c r4:838c1580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848cb000 r8:838c15ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:838c1580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:838c1580 r8:8027ed34 r7:dfb89e60 r6:84501180 r5:848cb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb95fb0 to 0xdfb95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8490fec0 INFO: task kworker/1:7:3196 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c099b000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:8:3197 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:8 state:D stack:0 pid:3197 tgid:3197 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb9dd84 r8:00000002 r7:60000113 r6:dfb9dd8c r5:848cbc00 r4:848cbc00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848cbc00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb9de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85827240 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848cbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebab3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a638c r4:857a6000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857a638c r4:84501200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848cbc00 r8:8450122c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84501200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84501200 r8:8027ed34 r7:dfb95e60 r6:833a6180 r5:848cbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb9dfb0 to 0xdfb9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8490fec0 INFO: task kworker/1:8:3197 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c0f48000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:9:3200 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:9 state:D stack:0 pid:3200 tgid:3200 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfba9d84 r8:00000002 r7:60000113 r6:dfba9d8c r5:848cc800 r4:848cc800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848cc800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85827600 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848cc800 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec317000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a738c r4:857a7000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857a738c r4:833a6100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848cc800 r8:833a612c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:833a6100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:833a6100 r8:8027ed34 r7:dfb95e60 r6:833a6080 r5:848cc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfba9fb0 to 0xdfba9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8490f180 INFO: task kworker/1:9:3200 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c113b000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:10:3202 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:10 state:D stack:0 pid:3202 tgid:3202 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfbb1d84 r8:00000002 r7:60000113 r6:dfbb1d8c r5:848cd400 r4:848cd400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848cd400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85827400 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848cd400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaf7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a6b8c r4:857a6800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857a6b8c r4:83390f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848cd400 r8:83390f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:83390f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83390f00 r8:8027ed34 r7:dfba9e60 r6:83390e80 r5:848cd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbb1fb0 to 0xdfbb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84910100 INFO: task kworker/1:10:3202 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c186a000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:11:3203 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:3203 tgid:3203 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb19d84 r8:00000002 r7:60000013 r6:dfb19d8c r5:848ce000 r4:848ce000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848ce000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb19e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85827500 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848ce000 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec301000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a6f8c r4:857a6c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857a6f8c r4:83bb1d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ce000 r8:83bb1dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:83bb1d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83bb1d80 r8:8027ed34 r7:dfba9e60 r6:83bb1d00 r5:848ce000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb19fb0 to 0xdfb19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84910100 INFO: task kworker/1:11:3203 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c2335000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:12:3207 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:12 state:D stack:0 pid:3207 tgid:3207 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfbbdd84 r8:00000002 r7:60000113 r6:dfbbdd8c r5:848cec00 r4:848cec00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848cec00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbbde08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85827700 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848cec00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec321000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a778c r4:857a7400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857a778c r4:83d6d980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848cec00 r8:83d6d9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:83d6d980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83d6d980 r8:8027ed34 r7:dfba9e60 r6:8490e000 r5:848cec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbbdfb0 to 0xdfbbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84910300 INFO: task kworker/1:12:3207 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c2900000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:13:3208 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:13 state:D stack:0 pid:3208 tgid:3208 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfbd1d84 r8:00000002 r7:60000013 r6:dfbd1d8c r5:848c0c00 r4:848c0c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848c0c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85827b00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848c0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5ab000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a7f8c r4:857a7c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857a7f8c r4:8490e080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848c0c00 r8:8490e0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8490e080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8490e080 r8:8027ed34 r7:dfbbde60 r6:8490e100 r5:848c0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd1fb0 to 0xdfbd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84910440 INFO: task kworker/1:13:3208 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c2900000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:15:3211 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:15 state:D stack:0 pid:3211 tgid:3211 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfbd9d84 r8:00000002 r7:60000113 r6:dfbd9d8c r5:848c2400 r4:848c2400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848c2400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85827c00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848c2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5b1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a838c r4:857a8000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857a838c r4:8490e280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848c2400 r8:8490e2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8490e280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8490e280 r8:8027ed34 r7:dfbc5e60 r6:8490e300 r5:848c2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd9fb0 to 0xdfbd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84910540 INFO: task kworker/1:15:3211 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c2900000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:16:3216 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:16 state:D stack:0 pid:3216 tgid:3216 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfc05d84 r8:00000002 r7:60000113 r6:dfc05d8c r5:840f1800 r4:840f1800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840f1800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc05e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85827c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:840f1800 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5b7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a878c r4:857a8400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857a878c r4:8490e380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840f1800 r8:8490e3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8490e380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8490e380 r8:8027ed34 r7:dfbc5e60 r6:8491c180 r5:840f1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc05fb0 to 0xdfc05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84910a00 INFO: task kworker/1:16:3216 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c2b17000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:17:3217 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:17 state:D stack:0 pid:3217 tgid:3217 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfc09d84 r8:00000002 r7:60000013 r6:dfc09d8c r5:84770000 r4:84770000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84770000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc09e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85827d80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84770000 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5bd000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a8b8c r4:857a8800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857a8b8c r4:8490e400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84770000 r8:8490e42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8490e400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8490e400 r8:8027ed34 r7:dfbc5e60 r6:8491c200 r5:84770000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc09fb0 to 0xdfc09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84910a00 INFO: task kworker/1:17:3217 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c3057000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:18:3219 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:18 state:D stack:0 pid:3219 tgid:3219 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfc1dd84 r8:00000002 r7:60000113 r6:dfc1dd8c r5:84771800 r4:84771800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84771800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc1de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85827e80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84771800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5cb000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a8f8c r4:857a8c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857a8f8c r4:8490e480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84771800 r8:8490e4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8490e480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8490e480 r8:8027ed34 r7:dfbc5e60 r6:8491c280 r5:84771800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84910e00 INFO: task kworker/1:18:3219 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c323b000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:76:3471 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:76 state:D stack:0 pid:3471 tgid:3471 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dff59d84 r8:00000002 r7:60000013 r6:dff59d8c r5:84a7bc00 r4:84a7bc00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a7bc00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff59e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85200 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a7bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc8b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495e78c r4:8495e400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495e78c r4:84aa7f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a7bc00 r8:84aa7f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84aa7f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa7f00 r8:8027ed34 r7:dfef1e60 r6:84a57580 r5:84a7bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff59fb0 to 0xdff59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a959c0 INFO: task kworker/0:76:3471 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c35bc000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:78:3501 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:78 state:D stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dff95d84 r8:00000002 r7:60000113 r6:dff95d8c r5:847e3000 r4:847e3000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847e3000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff95e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 INFO: task kworker/0:78:3501 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c35bc000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:129:3517 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:129 state:D stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dffc5d84 r8:00000002 r7:60000113 r6:dffc5d8c r5:847a0c00 r4:847a0c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847a0c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffc5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac4c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe29000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb78c r4:84adb400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb78c r4:84a92680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a0c00 r8:84a926ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92680 r8:8027ed34 r7:dffc1e60 r6:84a44380 r5:847a0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc5fb0 to 0xdffc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac100 INFO: task kworker/1:129:3517 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c3d0f000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:130:3519 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:130 state:D stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dffc9d84 r8:00000002 r7:60000013 r6:dffc9d8c r5:847a2400 r4:847a2400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847a2400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffc9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 INFO: task kworker/1:130:3519 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c3d0f000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:79:3521 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:79 state:D stack:0 pid:3521 tgid:3521 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dffbdd84 r8:00000002 r7:60000113 r6:dffbdd8c r5:847a3000 r4:847a3000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847a3000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffbde08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ac1840 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847a3000 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd1d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495db8c r4:8495d800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495db8c r4:84a44480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a3000 r8:84a444ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44480 r8:8027ed34 r7:dff59e60 r6:84a44500 r5:847a3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffbdfb0 to 0xdffbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9cf00 INFO: task kworker/0:79:3521 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c3f3c000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:131:3523 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:131 state:D stack:0 pid:3523 tgid:3523 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:829185c4 r9:dffb5d84 r8:00000002 r7:60000113 r6:dffb5d8c r5:84a88000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffb5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac6c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a88000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe6b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adbf8c r4:84adbc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adbf8c r4:84a92800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a88000 r8:84a9282c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92800 r8:8027ed34 r7:dffc5e60 r6:84a92880 r5:84a88000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffb5fb0 to 0xdffb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac400 INFO: task kworker/1:131:3523 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c426d000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 r5:00001000 r4:dfdff000 r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:132 state:D stack:0 pid:3525 tgid:3525 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dffcdd84 r8:00000002 r7:60000113 r6:dffcdd8c r5:84a89800 r4:84a89800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a89800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffcde08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac580 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a89800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe3b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adbb8c r4:84adb800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adbb8c r4:84a92900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a89800 r8:84a9292c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92900 r8:8027ed34 r7:dffb5e60 r6:84a92980 r5:84a89800 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:133:3527 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:133 state:D stack:0 pid:3527 tgid:3527 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffd1e08 r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:84a8a400 r8:84a92a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:134:3528 blocked for more than 452 seconds. [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84a92b00 r8:8027ed34 r7:dffd1e60 r6:84a92b80 r5:84a8b000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84aac8c0 INFO: task kworker/1:134:3528 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c4ef0000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:135:3529 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:135 state:D stack:0 pid:3529 tgid:3529 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dffd9d84 r8:00000002 r7:60000013 r6:dffd9d8c r5:84a8c800 r4:84a8c800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a8c800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffd9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aacc00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a8c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe89000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ae078c r4:84ae0400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ae078c r4:84a92c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a8c800 r8:84a92c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92c00 r8:8027ed34 r7:dffd1e60 r6:84a92c80 r5:84a8c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd9fb0 to 0xdffd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 1d60: 800f0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 INFO: task kworker/1:136:3533 blocked for more than 453 seconds. [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:84ae0f8c r4:84ae0c00 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84aacc80 INFO: task kworker/1:136:3533 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c571d000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:829185c4 r9:dff25d84 r8:00000002 r7:60000113 r6:dff25d8c r5:847a3c00 r4:847a3c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847a3c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff25e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a95f80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9d7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ae1b8c r4:84ae1800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ae1b8c r4:84a92d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a3c00 r8:84a92dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:138:3536 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:138 state:D stack:0 pid:3536 tgid:3536 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dff2dd84 r8:00000002 r7:60000113 r6:dff2dd8c r5:847a6c00 r4:847a6c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847a6c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff2de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9c180 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df921000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ae138c r4:84ae1000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ae138c r4:84a92e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a6c00 r8:84a92e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92e00 r8:8027ed34 r7:dff25e60 r6:84a44680 r5:847a6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff2dfb0 to 0xdff2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aacd80 INFO: task kworker/1:138:3536 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c59eb000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 r5:00001000 r4:dfdff000 r4:84a92700 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:139 state:D stack:0 pid:3538 tgid:3538 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dff49d84 r8:00000002 r7:60000013 r6:dff49d8c r5:847a4800 r4:847a4800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847a4800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff49e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a91fc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9af000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ae178c r4:84ae1400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:dffc1dc0 r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:140:3540 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:140 state:D stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dffedd84 r8:00000002 r7:60000013 r6:dffedd8c r5:847a5400 r4:847a5400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847a5400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffede08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ac2540 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a5400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaab000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ae2f8c r4:84ae2c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:141:3542 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:141 state:D stack:0 pid:3542 tgid:3542 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfff5d84 r8:00000002 r7:60000113 r6:dfff5d8c r5:84868000 r4:84868000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84868000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfff5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ac2000 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84868000 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9ff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ae1f8c r4:84ae1c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ae1f8c r4:84a92f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84868000 r8:84a92fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92f80 r8:8027ed34 r7:dffede60 r6:84a44800 r5:84868000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfff5fb0 to 0xdfff5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aacec0 INFO: task kworker/1:141:3542 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:142:3544 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:142 state:D stack:0 pid:3544 tgid:3544 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfffdd84 r8:00000002 r7:60000113 r6:dfffdd8c r5:84869800 r4:84869800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84869800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfffde08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ac21c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84869800 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84ac5000 Exception stack(0xdfffdfb0 to 0xdfffdff8) r4:84ac20c0 Call trace: Exception stack(0xdffc1d20 to 0xdffc1d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:143:3546 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:143 state:D stack:0 pid:3546 tgid:3546 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0005d84 r8:00000002 r7:60000113 r6:e0005d8c r5:8486b000 r4:8486b000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8486b000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0005e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ac2280 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486b000 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa53000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ae278c r4:84ae2400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ae278c r4:84ac5080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486b000 r8:84ac50ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ac5080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ac5080 r8:8027ed34 r7:dffede60 r6:84a44900 r5:8486b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0005fb0 to 0xe0005ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ac2180 INFO: task kworker/1:143:3546 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:144:3548 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:144 state:D stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e000dd84 r8:00000002 r7:60000113 r6:e000dd8c r5:8486a400 r4:8486a400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8486a400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e000de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ac23c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486a400 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa83000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ae2b8c r4:84ae2800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ae2b8c r4:84ac5100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:145:3551 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:145 state:D stack:0 pid:3551 tgid:3551 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0019d84 r8:00000002 r7:60000013 r6:e0019d8c r5:8486bc00 r4:8486bc00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8486bc00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0019e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ac2a00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb49000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ae3f8c r4:84ae3c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ae3f8c r4:84ac5180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84ac5180 Exception stack(0xe0019fb0 to 0xe0019ff8) task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82abf1e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:146:3552 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:146 state:D stack:0 pid:3552 tgid:3552 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e001dd84 r8:00000002 r7:60000113 r6:e001dd8c r5:8486e000 r4:8486e000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8486e000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e001de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ac2600 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486e000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ae338c r4:84ae3000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ae338c r4:84ac5200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84ac5200 Exception stack(0xe001dfb0 to 0xe001dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ac24c0 INFO: task kworker/1:146:3552 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c7608000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:147:3554 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:147 state:D stack:0 pid:3554 tgid:3554 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0025d84 r8:00000002 r7:60000113 r6:e0025d8c r5:8486d400 r4:8486d400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8486d400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0025e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ac2740 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486d400 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ae378c r4:84ae3400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ae378c r4:84ac5280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84a92700 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:148:3556 blocked for more than 453 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0029d84 r8:00000002 r7:60000113 r6:e0029d8c r5:8486ec00 r4:8486ec00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8486ec00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0029e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ac2940 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb25000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ae3b8c r4:84ae3800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ae3b8c r4:84ac5300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486ec00 r8:84ac532c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ac5300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ac5300 r8:8027ed34 r7:e0019e60 r6:84a44b80 r5:8486ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ac2880 INFO: task kworker/1:148:3556 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c7c78000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:149:3558 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:149 state:D stack:0 pid:3558 tgid:3558 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e002dd84 r8:00000002 r7:60000113 r6:e002dd8c r5:8486c800 r4:8486c800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8486c800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e002de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ac2d80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd3b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ae878c r4:84ae8400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ae878c r4:84ac5380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:84ac53ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ac5380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ac5380 r8:8027ed34 r7:e0019e60 r6:84a44c00 r5:8486c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe002dfb0 to 0xe002dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ac2bc0 INFO: task kworker/1:149:3558 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c7f73000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:150:3559 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:150 state:D stack:0 pid:3559 tgid:3559 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0031d84 r8:00000002 r7:60000013 r6:e0031d8c r5:84868c00 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:dfd05000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ae838c r4:84ae8000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ae838c r4:84ac5400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84868c00 r8:84ac542c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ac5400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ac5400 r8:8027ed34 r7:e002de60 r6:84a44c80 r5:84868c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0031fb0 to 0xe0031ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ac2a40 INFO: task kworker/1:150:3559 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc1d20 to 0xdffc1d68) 1d20: c8457000 dfcbb000 00000001 80239bb8 7f15d000 00000001 82abf1c4 82abe5a0 1d40: 7f15d000 dfcbb000 8280c9b4 dffc1d9c dffc1da0 dffc1d70 80230af4 80239bd0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc1dc0 r5:dffc1e08 r4:dffc1dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adaf8c r4:84adac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adaf8c r4:84a92700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a1800 r8:84a9272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92700 r8:8027ed34 r7:dffade60 r6:84a44300 r5:847a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:151:3565 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:151 state:D stack:0 pid:3565 tgid:3565 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dffb9d84 r8:00000002 r7:60000013 r6:dffb9d8c r5:847e5400 r4:847e5400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847e5400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffb9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b84040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd71000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ae8f8c r4:84ae8c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ae8f8c r4:84ac5480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e5400 r8:84ac54ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ac5480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ac5480 r8:8027ed34 r7:e002de60 r6:84a44d80 r5:847e5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffb9fb0 to 0xdffb9ff8) 9fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 r5:00001000 r4:dfdff000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:847a0000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847a0000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0021e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85440 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847a0000 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc6d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495e38c r4:8495e000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495e38c r4:84a44d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a0000 r8:84a44d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44d00 r8:8027ed34 r7:dff59e60 r6:84a44e00 r5:847a0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0021fb0 to 0xe0021ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ac19c0 INFO: task kworker/0:80:3566 is blocked on a mutex likely owned by task kworker/1:128:3515. task:kworker/1:128 state:R running task stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a1800 r8:80200be4 r7:dffc1d54 r6:ffffffff r5:847a1800 r4:00000000 [<81a28a54>] (preempt_schedule_ir <> 84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:675:4823 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:675 state:D stack:0 pid:4823 tgid:4823 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb3edd84 r8:00000002 r7:60000113 r6:eb3edd8c r5:847c8000 r4:847c8000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847c8000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3ede08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aa1e80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847c8000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d9000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3ef000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bab8c r4:854ba800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854bab8c r4:84aa0400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847c8000 r8:84aa042c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84aa0400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa0400 r8:8027ed34 r7:eb3e1e60 r6:84a29880 r5:847c8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3edfb0 to 0xeb3edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aa1b00 INFO: task kworker/1:675:4823 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: deef7000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:676:4826 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:676 state:D stack:0 pid:4826 tgid:4826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb161d84 r8:00000002 r7:60000113 r6:eb161d8c r5:847c8c00 r4:847c8c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847c8c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb161e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aa1ac0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847c8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa6d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bb38c r4:854bb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854bb38c r4:84aa0480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847c8c00 r8:84aa04ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84aa0480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa0480 r8:8027ed34 r7:eb3e1e60 r6:84a29900 r5:847c8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb161fb0 to 0xeb161ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aa1d00 INFO: task kworker/1:676:4826 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: df2ad000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:677:4829 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:677 state:D stack:0 pid:4829 tgid:4829 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb1f1d84 r8:00000002 r7:60000013 r6:eb1f1d8c r5:847c9800 r4:847c9800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847c9800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1f1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a2e040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847c9800 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bb78c r4:854bb400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854bb78c r4:84aa0500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847c9800 r8:84aa052c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84aa0500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa0500 r8:8027ed34 r7:eb161e60 r6:84a29980 r5:847c9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1f1fb0 to 0xeb1f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a2e0c0 INFO: task kworker/1:677:4829 is blocked on a mutex likely owned by task kworker/1:130:3519. task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847a2400 r8:80200be4 r7:dffc9d54 r6:ffffffff r5:847a2400 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffc9d20 to 0xdffc9d68) 9d20: df2ad000 dfcd1000 00000001 80239bb8 7f15f000 00000001 82abf1c4 82abe5a0 9d40: 7f15f000 dfcd1000 8280c9b4 dffc9d9c dffc9da0 dffc9d70 80230af4 80239bd0 9d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffc9dc0 r5:dffc9e08 r4:dffc9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aac100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84adb38c r4:84adb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84adb38c r4:84a92780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847a2400 r8:84a927ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:678:4830 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:678 state:D stack:0 pid:4830 tgid:4830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb201d84 r8:00000002 r7:60000013 r6:eb201d8c r5:847ca400 r4:847ca400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847ca400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb201e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a2e1c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847ca400 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0635000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bbb8c r4:854bb800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854bbb8c r4:84aa0580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847ca400 r8:84aa05ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84aa0580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa0580 r8:8027ed34 r7:eb1f1e60 r6:84a29a00 r5:847ca400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb201fb0 to 0xeb201ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:130 state:R running task stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84a92780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a92780 r8:8027ed34 r7:dffc5e60 r6:84a44400 r5:847a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aac340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:679:4832 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:679 state:D stack:0 pid:4832 tgid:4832 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb3fdd84 r8:00000002 r7:60000113 r6:eb3fdd8c r5:847cc800 r4:847cc800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847cc800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3fde08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a2e340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847cc800 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e071d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bbf8c r4:854bbc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854bbf8c r4:84aa0600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847cc800 r8:84aa062c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84aa0600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa0600 r8:8027ed34 r7:eb201e60 r6:84a29a80 r5:847cc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3fdfb0 to 0xeb3fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r5:90000013 r4:80239bd0 r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 5fa0: 00000000 00000000 00000000 00000000 r4:84a9c1c0 task:kworker/1:680 state:D stack:0 pid:4833 tgid:4833 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb401e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a2e180 INFO: task kworker/1:680:4833 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7f560000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:681:4835 blocked for more than 475 seconds. task:kworker/1:681 state:D stack:0 pid:4835 tgid:4835 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb409e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a2e440 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:854bc38c r4:84aa0700 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a2e400 INFO: task kworker/1:681:4835 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7f560000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:682:4837 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:682 state:D stack:0 pid:4837 tgid:4837 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb411d84 r8:00000002 r7:60000113 r6:eb411d8c r5:847cb000 r4:847cb000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847cb000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb411e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a2ea40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847cb000 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab1b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bd78c r4:854bd400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854bd78c r4:84aa0780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847cb000 r8:84aa07ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84aa0780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa0780 r8:8027ed34 r7:eb401e60 r6:84a29c00 r5:847cb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb411fb0 to 0xeb411ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a2e3c0 INFO: task kworker/1:682:4837 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7f560000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:683:4839 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:683 state:D stack:0 pid:4839 tgid:4839 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb42dd84 r8:00000002 r7:60000113 r6:eb42dd8c r5:847ce000 r4:847ce000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847ce000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb42de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a2e780 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847ce000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e89c5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bcf8c r4:854bcc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:847ce000 r8:84aa08ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a2e8c0 INFO: task kworker/1:683:4839 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7f560000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb435e08 r4:00000000 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:854bd38c r4:854bd000 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r5:8495d38c r4:8495d000 r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:84a9c1c0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:685 state:D stack:0 pid:4843 tgid:4843 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb43dd84 r8:00000002 r7:60000113 r6:eb43dd8c r5:85508000 r4:85508000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85508000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb43de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a2ed00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85508000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac5b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bdf8c r4:854bdc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854bdf8c r4:84aa0980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85508000 r8:84aa09ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84aa0980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa0980 r8:8027ed34 r7:eb411e60 r6:84a29d80 r5:85508000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb43dfb0 to 0xeb43dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a2e900 INFO: task kworker/1:685:4843 is blocked on a mutex likely owned by task kworker/0:78:3501. Workqueue: events bpf_prog_free_deferred r4:00000000 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 r4:dff95dc0 r4:00000000 r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xdff95fb0 to 0xdff95ff8) r4:84a9c1c0 task:kworker/1:686 state:D stack:0 pid:4845 tgid:4845 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r4:84aa0a00 r4:84a2e9c0 5d20: 7f560000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:687:4847 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:687 state:D stack:0 pid:4847 tgid:4847 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb44dd84 r8:00000002 r7:60000113 r6:eb44dd8c r5:8550a400 r4:8550a400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8550a400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb44de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a2ed80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8550a400 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacbd000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854be38c r4:854be000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854be38c r4:84aa0a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8550a400 r8:84aa0aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84aa0a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa0a80 r8:8027ed34 r7:eb43de60 r6:84a29e80 r5:8550a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb44dfb0 to 0xeb44dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a2eb40 INFO: task kworker/1:687:4847 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:688 state:D stack:0 pid:4849 tgid:4849 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb455e08 r9:83018205 r8:85509800 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r10:61c88647 r9:85509800 r8:84aa0b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 5d20: 7f560000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 r4:00000000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:689:4851 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:689 state:D stack:0 pid:4851 tgid:4851 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb45dd84 r8:00000002 r7:60000113 r6:eb45dd8c r5:8550d400 r4:8550d400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8550d400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb45de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a2ef80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8550d400 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eace3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854be78c r4:854be400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854be78c r4:84aa0b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8550d400 r8:84aa0bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84aa0b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa0b80 r8:8027ed34 r7:eb455e60 r6:84a29f80 r5:8550d400 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:00000000 r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:690:4853 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:690 state:D stack:0 pid:4853 tgid:4853 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb465d84 r8:00000002 r7:60000013 r6:eb465d8c r5:8550c800 r4:8550c800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8550c800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb465e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a20740 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r4:82abf1e4 r4:00000000 r5:00001000 r4:dfe1f000 r4:84a44080 Exception stack(0xdff95fb0 to 0xdff95ff8) INFO: task kworker/1:691:4856 blocked for more than 476 seconds. Call trace: [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85541180 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8550bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead45000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bf38c r4:854bf000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854bf38c r4:84aa0c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8550bc00 r8:84aa0cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84aa0c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa0c80 r8:8027ed34 r7:eb455e60 r6:85544080 r5:8550bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb471fb0 to 0xeb471ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85541080 INFO: task kworker/1:691:4856 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7f8e6000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:692:4858 blocked for more than 476 seconds. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb479e08 r4:00000000 r5:00001000 r4:ead73000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb479fb0 to 0xeb479ff8) INFO: task kworker/1:692:4858 is blocked on a mutex likely owned by task kworker/0:78:3501. [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82abf1e4 r4:dff95dc0 r4:00000000 r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84a44080 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb47de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85541bc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8550ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaff7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c138c r4:854c1000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854c138c r4:84aa0d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8550ec00 r8:84aa0dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84aa0d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa0d80 r8:8027ed34 r7:eb479e60 r6:85544180 r5:8550ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb47dfb0 to 0xeb47dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85541140 INFO: task kworker/1:693:4859 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdff95d20 to 0xdff95d68) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:694 state:D stack:0 pid:4861 tgid:4861 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84778c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb485e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855414c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84778c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead89000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bfb8c r4:854bf800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854bfb8c r4:84aa0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84778c00 r8:84aa0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84aa0e00 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84a44080 r4:00000001 INFO: task kworker/1:695:4863 blocked for more than 476 seconds. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb48de08 r7:ddde2d40 r6:83018200 r5:854bff8c r4:84aa0e80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:696:4865 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:696 state:D stack:0 pid:4865 tgid:4865 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb495d84 r8:00000002 r7:60000113 r6:eb495d8c r5:8477b000 r4:8477b000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8477b000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb495e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85541680 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8477b000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf4b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c038c r4:854c0000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854c038c r4:84aa0f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8477b000 r8:84aa0f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84aa0f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aa0f00 r8:8027ed34 r7:eb47de60 r6:85544300 r5:8477b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb495fb0 to 0xeb495ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85541500 INFO: task kworker/1:696:4865 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7f8e6000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 r4:00000000 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xdff95fb0 to 0xdff95ff8) task:kworker/1:697 state:D stack:0 pid:4867 tgid:4867 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb49de08 r4:00000000 r7:ddde2d40 r6:83018200 r5:854c078c r4:84aa0f80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:90000013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:698:4869 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:698 state:D stack:0 pid:4869 tgid:4869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb4a5d84 r8:00000002 r7:60000013 r6:eb4a5d8c r5:84779800 r4:84779800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84779800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4a5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855418c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84779800 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf9b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c0b8c r4:854c0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854c0b8c r4:85550080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84779800 r8:855500ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85550080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85550080 r8:8027ed34 r7:eb47de60 r6:85544400 r5:84779800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4a5fb0 to 0xeb4a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85541800 INFO: task kworker/1:698:4869 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7f8e6000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r10:829185c4 r9:eb4add84 r8:00000002 r7:60000113 r6:eb4add8c r5:84778000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4ade08 r4:00000000 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:854c0f8c r4:85550000 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 5d60: 90000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:700:4874 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:700 state:D stack:0 pid:4874 tgid:4874 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb4b9d84 r8:00000002 r7:60000113 r6:eb4b9d8c r5:8477c800 r4:8477c800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8477c800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4b9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85541cc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8477c800 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb003000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c178c r4:854c1400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854c178c r4:85550100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8477c800 r8:8555012c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85550100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85550100 r8:8027ed34 r7:eb47de60 r6:85544500 r5:8477c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4b9fb0 to 0xeb4b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855419c0 INFO: task kworker/1:700:4874 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7f8e6000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:701:4876 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:701 state:D stack:0 pid:4876 tgid:4876 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:829185c4 r9:eb4c1d84 r8:00000002 r7:60000113 r6:eb4c1d8c r5:8477ec00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4c1e08 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85560040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8477ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb05d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c278c r4:854c2400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854c278c r4:85550180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:85550180 r8:8027ed34 r7:eb4b9e60 r6:85544580 r5:8477ec00 1fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82abf1e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:702:4877 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:702 state:D stack:0 pid:4877 tgid:4877 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82abf1e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829185c4 r9:eb4cdd84 r8:00000002 r7:60000113 r6:eb4cdd8c r5:8477d400 r4:8477d400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8477d400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4cde08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85541fc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8477d400 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb02d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c1f8c r4:854c1c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854c1f8c r4:85550280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8477d400 r8:855502ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85550280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85550280 r8:8027ed34 r7:eb4c1e60 r6:85544680 r5:8477d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4cdfb0 to 0xeb4cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85541f80 INFO: task kworker/1:703:4879 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7f8e6000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:704:4881 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:704 state:D stack:0 pid:4881 tgid:4881 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb4d5d84 r8:00000002 r7:60000113 r6:eb4d5d8c r5:85520c00 r4:85520c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85520c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a50480 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85520c00 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb047000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c238c r4:854c2000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854c238c r4:85550300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85520c00 r8:8555032c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85550300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85550300 r8:8027ed34 r7:eb4c1e60 r6:85544700 r5:85520c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4d5fb0 to 0xeb4d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:704:4881 is blocked on a mutex likely owned by task kworker/0:78:3501. Exception stack(0xdff95d20 to 0xdff95d68) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/1:705:4884 blocked for more than 476 seconds. r10:829185c4 r9:eb4ddd84 r8:00000002 r7:60000113 r6:eb4ddd8c r5:85522400 r4:85522400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85522400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4dde08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855603c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85522400 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb163000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c338c r4:854c3000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854c338c r4:85550380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85522400 r8:855503ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85550380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85550380 r8:8027ed34 r7:eb4c1e60 r6:85544780 r5:85522400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4ddfb0 to 0xeb4ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85560080 INFO: task kworker/1:705:4884 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7f8e6000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 r4:dff95dc0 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:706 state:D stack:0 pid:4885 tgid:4885 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85523000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4e1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855601c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85523000 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb073000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c2b8c r4:854c2800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854c2b8c r4:85550400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85523000 r8:8555042c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85550400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85550400 r8:8027ed34 r7:eb4dde60 r6:85544800 r5:85523000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4e1fb0 to 0xeb4e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85560080 INFO: task kworker/1:706:4885 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 Exception stack(0xdff95d20 to 0xdff95d68) r4:00000000 r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:707:4887 blocked for more than 476 seconds. Workqueue: events bpf_prog_free_deferred r10:829185c4 r9:eb4d1d84 r8:00000002 r7:60000113 r6:eb4d1d8c r5:853e4800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d1e08 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018205 r8:853e4800 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 r5:854c2f8c r4:854c2c00 r7:ddde2d40 r6:83018200 r5:854c2f8c r4:85550480 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4d1fb0 to 0xeb4d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85560180 INFO: task kworker/1:707:4887 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7f8e6000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:708:4890 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:708 state:D stack:0 pid:4890 tgid:4890 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:853e5400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4e5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85560500 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb16f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c378c r4:854c3400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854c378c r4:85550580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e5400 r8:855505ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85550580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4e5fb0 to 0xeb4e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85560400 INFO: task kworker/1:708:4890 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7f8e6000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3f9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85560780 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb3f9fb0 to 0xeb3f9ff8) INFO: task kworker/1:709:4891 is blocked on a mutex likely owned by task kworker/0:78:3501. 5d60: 90000013 ffffffff [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:710:4894 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:710 state:D stack:0 pid:4894 tgid:4894 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb4edd84 r8:00000002 r7:60000013 r6:eb4edd8c r5:853e6c00 r4:853e6c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853e6c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4ede08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85560a00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853e6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb19d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c438c r4:854c4000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854c438c r4:85550780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e6c00 r8:855507ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:85560540 Call trace: r4:00000000 5d60: 90000013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xdff95fb0 to 0xdff95ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:711:4895 blocked for more than 476 seconds. Workqueue: events bpf_prog_free_deferred r10:829185c4 r9:eb4f1d84 r8:00000002 r7:60000113 r6:eb4f1d8c r5:853e0c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4f1e08 r4:00000000 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb193000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c3f8c r4:854c3c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854c3f8c r4:85550880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e0c00 r8:855508ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85550880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85550880 r8:8027ed34 r7:eb4ede60 r6:85550900 r5:853e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4f1fb0 to 0xeb4f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85560540 INFO: task kworker/1:711:4895 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7f8e6000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:712:4898 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:712 state:D stack:0 pid:4898 tgid:4898 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb4f9d84 r8:00000002 r7:60000013 r6:eb4f9d8c r5:853e2400 r4:853e2400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853e2400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4f9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a204c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853e2400 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa55000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c4f8c r4:854c4c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854c4f8c r4:85550980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e2400 r8:855509ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85550980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85550980 r8:8027ed34 r7:eb4ede60 r6:85550a00 r5:853e2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4f9fb0 to 0xeb4f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85560a40 INFO: task kworker/1:712:4898 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7f8e6000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 r4:dff95dc0 r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 r4:84a44080 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r5:853e3c00 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4fde08 r4:00000000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb4fdfb0 to 0xeb4fdff8) INFO: task kworker/1:713:4900 is blocked on a mutex likely owned by task kworker/0:78:3501. Exception stack(0xdff95d20 to 0xdff95d68) r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:714:4903 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:714 state:D stack:0 pid:4903 tgid:4903 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb2d5d84 r8:00000002 r7:60000013 r6:eb2d5d8c r5:853e8000 r4:853e8000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853e8000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2d5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a8040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853e8000 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe21000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c538c r4:854c5000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854c538c r4:85550b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e8000 r8:85550bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85550b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85550b80 r8:8027ed34 r7:eb4f9e60 r6:85550c00 r5:853e8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2d5fb0 to 0xeb2d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85560b00 INFO: task kworker/1:714:4903 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7f8e6000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:715 state:D stack:0 pid:4904 tgid:4904 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4f5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a8200 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85524800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0181000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c578c r4:854c5400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854c578c r4:85550c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85524800 r8:85550cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85550c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85550c80 r8:8027ed34 r7:eb2d5e60 r6:85544880 r5:85524800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4f5fb0 to 0xeb4f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855a8180 INFO: task kworker/1:715:4904 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7f8e6000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:716:4906 blocked for more than 476 seconds. Workqueue: events bpf_prog_free_deferred [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855a8240 INFO: task kworker/1:716:4906 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7f8e6000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:717:4909 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:717 state:D stack:0 pid:4909 tgid:4909 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb361d84 r8:00000002 r7:60000013 r6:eb361d8c r5:85526c00 r4:85526c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85526c00 r4:829185c0 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb361e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a8340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85526c00 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c5f8c r4:854c5c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854c5f8c r4:85550e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85526c00 r8:85550e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85550e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85550e00 r8:8027ed34 r7:eb2e5e60 r6:85544980 r5:85526c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb361fb0 to 0xeb361ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855a83c0 INFO: task kworker/1:717:4909 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7f8e6000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 r4:82abf1e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855aa040 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 5d60: 90000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 r4:84a9c1c0 r5:85525400 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb505e08 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb505fb0 to 0xeb505ff8) r4:855a84c0 Workqueue: events bpf_prog_free_deferred 5d60: 90000013 ffffffff r4:dff95dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:721:4916 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:721 state:D stack:0 pid:4916 tgid:4916 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb501d84 r8:00000002 r7:60000013 r6:eb501d8c r5:853e9800 r4:853e9800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853e9800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb501e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a89c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853e9800 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead8f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c6b8c r4:854c6800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854c6b8c r4:85550f80 r10:00000000 r9:85550f80 r8:8027ed34 r7:eb375e60 r6:855b2000 r5:853e9800 task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb509e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ae900 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8550e000 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eada1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8492338c r4:84923000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8492338c r4:85544b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8550e000 r8:85544bac r7:82804d40 r6:dddced40 r5:dddced60 r4:85544b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85544b80 r8:8027ed34 r7:eb1c9e60 r6:85544c00 r5:8550e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb509fb0 to 0xeb509ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855ae7c0 INFO: task kworker/0:176:4919 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7fed1000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:722 state:D stack:0 pid:4921 tgid:4921 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a8c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb309fb0 to 0xeb309ff8) r4:855a88c0 r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:dff95dc0 r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:723:4924 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:723 state:D stack:0 pid:4924 tgid:4924 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb515d84 r8:00000002 r7:60000113 r6:eb515d8c r5:853eb000 r4:853eb000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853eb000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb515e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a8900 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853eb000 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae27000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:853eb000 r8:855b212c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:dff95dc0 r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:177:4926 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:177 state:D stack:0 pid:4926 tgid:4926 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb50dd84 r8:00000002 r7:60000113 r6:eb50dd8c r5:84768000 r4:84768000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84768000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb50de08 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:dddced40 r6:83018000 r5:854c738c r4:85544d00 Exception stack(0xeb50dfb0 to 0xeb50dff8) r4:855ae8c0 INFO: task kworker/0:177:4926 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7fed1000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb733000 r10:61c88647 r9:84768c00 r8:85544e2c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7fed1000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84a9c1c0 Not tainted 6.16.0-rc1-syzkaller #0 task:kworker/1:724 state:D stack:0 pid:4929 tgid:4929 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb51dd84 r8:00000002 r7:60000113 r6:eb51dd8c r5:84769800 r4:84769800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84769800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb51de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855aa240 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84769800 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb51dfb0 to 0xeb51dff8) r4:855a8e80 Call trace: 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 r4:00000000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:725 state:D stack:0 pid:4932 tgid:4932 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:829185c4 r9:eb525d84 r8:00000002 r7:60000013 r6:eb525d8c r5:8476b000 r4:8476b000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8476b000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb525e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855aa180 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8476b000 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae91000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c7f8c r4:854c7c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854c7f8c r4:855b2280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476b000 r8:855b22ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855b2280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855b2280 r8:8027ed34 r7:eb51de60 r6:85544f80 r5:8476b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb525fb0 to 0xeb525ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855aa080 INFO: task kworker/1:725:4932 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82abf1e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:726 state:D stack:0 pid:4935 tgid:4935 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855aa740 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8476c800 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb145000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bad38c r4:84bad000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bad38c r4:855b2300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476c800 r8:855b232c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855b2300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855b2300 r8:8027ed34 r7:eb51de60 r6:855b5000 r5:8476c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb531fb0 to 0xeb531ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855aa3c0 INFO: task kworker/1:726:4935 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7fed1000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:727:4936 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:727 state:D stack:0 pid:4936 tgid:4936 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb535d84 r8:00000002 r7:60000113 r6:eb535d8c r5:8476bc00 r4:8476bc00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8476bc00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb535e08 r4:00000000 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb535fb0 to 0xeb535ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xdff95d20 to 0xdff95d68) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r10:829185c4 r9:eb53dd84 r8:00000002 r7:60000113 r6:eb53dd8c r5:8476a400 r4:8476a400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8476a400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb53de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855aa400 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8476a400 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0b3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bacb8c r4:84bac800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bacb8c r4:855b2400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476a400 r8:855b242c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855b2400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855b2400 r8:8027ed34 r7:eb531e60 r6:855b5100 r5:8476a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb53dfb0 to 0xeb53dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855aa400 INFO: task kworker/1:728:4938 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7fed1000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:729 state:D stack:0 pid:4940 tgid:4940 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855aa680 r10:61c88647 r9:8476ec00 r8:855b24ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855aa4c0 INFO: task kworker/1:729:4940 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7fed1000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb15b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bad78c r4:84bad400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84bad78c r4:855b5200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:855b522c r7:82804d40 r6:dddced40 r5:dddced60 r4:855b5200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855b5200 r8:8027ed34 r7:eb511e60 r6:855b5280 r5:8476d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb549fb0 to 0xeb549ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855ae2c0 Workqueue: events bpf_prog_free_deferred 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 r4:00000000 r5:8495d38c r4:8495d000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:730:4943 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:730 state:D stack:0 pid:4943 tgid:4943 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb551d84 r8:00000002 r7:60000013 r6:eb551d8c r5:84758c00 r4:84758c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84758c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb551e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855aab00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84758c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855aa600 INFO: task kworker/1:730:4943 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7fed1000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:84759800 r4:829185c0 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:84759800 r8:855b25ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855b2580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855b2580 r8:8027ed34 r7:eb551e60 r6:855b5380 r5:84759800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb521fb0 to 0xeb521ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855aaa40 INFO: task kworker/1:731:4946 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7fed1000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:732:4948 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:732 state:D stack:0 pid:4948 tgid:4948 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb555d84 r8:00000002 r7:60000113 r6:eb555d8c r5:8475a400 r5:8475a400 r4:829185c0 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb555e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855aac00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8475a400 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb205000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84badf8c r4:84badc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84badf8c r4:855b2600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8475a400 r8:855b262c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855b2600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855b2600 r8:8027ed34 r7:eb521e60 r6:855b5400 r5:8475a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb555fb0 to 0xeb555ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855aac80 INFO: task kworker/1:732:4948 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:82abf1e4 r4:00000000 r5:8495d38c r4:8495d000 r4:84a44080 5fa0: 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb54de08 r4:00000000 r5:84bae78c r4:84bae400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bae78c r4:855b2680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853ec800 r8:855b26ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855b2680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855b2680 r8:8027ed34 r7:eb521e60 r6:855b2700 r5:853ec800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb54dfb0 to 0xeb54dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855aac80 INFO: task kworker/1:733:4951 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7fed1000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:734:4953 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:734 state:D stack:0 pid:4953 tgid:4953 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb519d84 r8:00000002 r7:60000113 r6:eb519d8c r5:853ed400 r4:853ed400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853ed400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb519e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bc040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853ed400 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb299000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d40 r6:83018200 r5:84baef8c r4:855b2780 Exception stack(0xeb519fb0 to 0xeb519ff8) r4:855aac80 Call trace: 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r5:8495d38c r4:8495d000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ae1c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853eec00 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb28d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84baeb8c r4:84bae800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84baeb8c r4:855b2880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853eec00 r8:855b28ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855b2880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855b2880 r8:8027ed34 r7:eb519e60 r6:855b2900 r5:853eec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb565fb0 to 0xeb565ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855aae00 INFO: task kworker/1:735:4955 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7fed1000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:736:4957 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:736 state:D stack:0 pid:4957 tgid:4957 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb56dd84 r8:00000002 r7:60000013 r6:eb56dd8c r5:8475c800 r4:8475c800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8475c800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb56de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:855b2980 dfa0: 00000000 00000000 00000000 00000000 Call trace: 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 r4:00000000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:737:4958 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:737 state:D stack:0 pid:4958 tgid:4958 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb571d84 r8:00000002 r7:60000113 r6:eb571d8c r5:8475d400 r4:8475d400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8475d400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb571e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bc100 r5:00001000 r4:eb2af000 r10:61c88647 r9:8475d400 r8:855b2a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7fed1000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84a9c1c0 Workqueue: events bpf_prog_free_deferred [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:84baf78c r4:855b2a80 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb579fb0 to 0xeb579ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855bc140 INFO: task kworker/1:738:4960 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7fed1000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:84a9c1c0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb581d84 r8:00000002 r7:60000113 r6:eb581d8c r5:8475bc00 r4:8475bc00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8475bc00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb581e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855b8600 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8475bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 r5:84b4678c r4:84b46400 r4:855b5600 Exception stack(0xeb581fb0 to 0xeb581ff8) r4:855b8340 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84a9c1c0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb589d84 r8:00000002 r7:60000113 r6:eb589d8c r5:84758000 r4:84758000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84758000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb589e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bc440 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84758000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2cd000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bafb8c r4:84baf800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:855b2b00 r8:8027ed34 r7:eb56de60 r6:855b5700 r5:84758000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855bc240 INFO: task kworker/1:739:4964 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7fed1000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 Not tainted 6.16.0-rc1-syzkaller #0 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bc5c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8475b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2eb000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84baff8c r4:84bafc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84baff8c r4:855b2b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8475b000 r8:855b2bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855b2b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855b2b80 r8:8027ed34 r7:eb56de60 r6:855b5780 r5:8475b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb58dfb0 to 0xeb58dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855bc240 INFO: task kworker/1:740:4965 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7fed1000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:84a9c1c0 Workqueue: events bpf_prog_free_deferred [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8475e000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab6d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b4638c r4:84b46000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b4638c r4:855b2c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8475e000 r8:855b2c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855b2c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855b2c00 r8:8027ed34 r7:eb56de60 r6:855b5800 r5:8475e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb595fb0 to 0xeb595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855bc680 INFO: task kworker/1:741:4967 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:dff95dc0 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84a44080 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:742:4969 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:742 state:D stack:0 pid:4969 tgid:4969 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb59dd84 r8:00000002 r7:60000113 r6:eb59dd8c r5:85600c00 r4:85600c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85600c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb59de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bc800 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85600c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb327000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b4478c r4:84b44400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b4478c r4:855b2c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85600c00 r8:855b2cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855b2c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855b2c80 r8:8027ed34 r7:eb595e60 r6:855b5880 r5:85600c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb59dfb0 to 0xeb59dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855bc640 INFO: task kworker/1:742:4969 is blocked on a mutex likely owned by task kworker/0:78:3501. [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:dff95dc0 r4:00000000 r5:8495d38c r4:8495d000 r4:84a44080 5fa0: 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r4:00000000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb3e5fb0 to 0xeb3e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855bc740 INFO: task kworker/1:743:4971 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7fed1000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xdff95fb0 to 0xdff95ff8) r4:84a9c1c0 task:kworker/1:744 state:D stack:0 pid:4974 tgid:4974 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bca80 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7fed1000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:745:4976 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:745 state:D stack:0 pid:4976 tgid:4976 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb461d84 r8:00000002 r7:60000113 r6:eb461d8c r5:85601800 r4:85601800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85601800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb461e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bcbc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85601800 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07b7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b4578c r4:84b45400 r7:ddde2d40 r6:83018200 r5:84b4578c r4:855b2e00 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84a44080 5fa0: 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb491d84 r8:00000002 r7:60000013 r6:eb491d8c r5:85603000 r4:85603000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85603000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb491e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bcd40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85603000 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e89a9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b45b8c r4:84b45800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b45b8c r4:855b2e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85603000 r8:855b2eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855b2e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855b2e80 r8:8027ed34 r7:eb595e60 r6:855b5a80 r5:85603000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb491fb0 to 0xeb491ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855bcc00 INFO: task kworker/1:746:4978 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: Exception stack(0xdff95d20 to 0xdff95d68) r4:dff95dc0 r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84a9c1c0 Workqueue: events bpf_prog_free_deferred [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb55de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855aeb80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853ee000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaf7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b45f8c r4:84b45c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b45f8c r4:855b2f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853ee000 r8:855b2f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855b2f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855b2f00 r8:8027ed34 r7:eb595e60 r6:855b2f80 r5:853ee000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb55dfb0 to 0xeb55dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855bccc0 INFO: task kworker/1:747:4980 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7fed1000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 r4:82abf1e4 r4:00000000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.16.0-rc1-syzkaller #0 r10:829185c4 r9:eb4a1d84 r8:00000002 r7:60000013 r6:eb4a1d8c r5:853ea400 r4:853ea400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853ea400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4a1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855d55c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853ea400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead11000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b46f8c r4:84b46c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b46f8c r4:855d7000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853ea400 r8:855d702c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855d7000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d7000 r8:8027ed34 r7:eb595e60 r6:855d7080 r5:853ea400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4a1fb0 to 0xeb4a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 5fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:749:4984 blocked for more than 477 seconds. r4:853ebc00 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:855d7100 r8:8027ed34 r7:eb4a1e60 r6:855d7180 r5:853ebc00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7fed1000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:181:4985 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:181 state:D stack:0 pid:4985 tgid:4985 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:85603c00 r4:829185c0 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r5:00001000 r4:eb489000 r4:855b5b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855b5b00 r8:8027ed34 r7:eb511e60 r6:855b5b80 r5:85603c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4b1fb0 to 0xeb4b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855b8200 INFO: task kworker/0:181:4985 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7fed1000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84a44080 Exception stack(0xdff95fb0 to 0xdff95ff8) r4:84a9c1c0 task:kworker/1:750 state:D stack:0 pid:4989 tgid:4989 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855d5480 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:855d7280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d7280 r8:8027ed34 r7:eb4a1e60 r6:855b5c00 r5:85605400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5adfb0 to 0xeb5adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855d5540 INFO: task kworker/1:750:4989 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7fed1000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:751:4991 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ac838c r4:855d7300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85606000 r8:855d732c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855d7300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d7300 r8:8027ed34 r7:eb5ade60 r6:855b5c80 r5:85606000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5b5fb0 to 0xeb5b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855d56c0 INFO: task kworker/1:751:4991 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7fed1000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r4:82abf1e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:752 state:D stack:0 pid:4992 tgid:4992 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:855d7380 r8:8027ed34 r7:eb5b5e60 r6:855b5d00 r5:85604800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:753:4994 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:753 state:D stack:0 pid:4994 tgid:4994 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855d59c0 r7:ddde2d40 r6:83018200 r5:84b47b8c r4:855d7400 Exception stack(0xeb5c1fb0 to 0xeb5c1ff8) r4:855d5780 Call trace: 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:754:4996 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:754 state:D stack:0 pid:4996 tgid:4996 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb5a1d84 r8:00000002 r7:60000113 r6:eb5a1d8c r5:853e8c00 r4:853e8c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853e8c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5a1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855d5ac0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853e8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf63000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b47f8c r4:84b47c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b47f8c r4:855d7480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e8c00 r8:855d74ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855d7480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 r4:00000000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:84a9c1c0 task:kworker/1:755 state:D stack:0 pid:4999 tgid:4999 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855d5f80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853e0000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb001000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ac8b8c r4:84ac8800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ac8b8c r4:855d7580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e0000 r8:855d75ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855d7580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d7580 r8:8027ed34 r7:eb5b5e60 r6:855d7600 r5:853e0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5c9fb0 to 0xeb5c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855d5b80 INFO: task kworker/1:755:4999 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 7fed1000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:756:5001 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:756 state:D stack:0 pid:5001 tgid:5001 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb5a5d84 r8:00000002 r7:60000013 r6:eb5a5d8c r5:85638c00 r4:85638c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85638c00 r4:829185c0 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855d5e00 r10:61c88647 r9:85638c00 r8:855d76ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 5d60: 90000013 ffffffff r4:00000000 r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 r4:84a44080 Exception stack(0xdff95fb0 to 0xdff95ff8) INFO: task kworker/1:757:5003 blocked for more than 477 seconds. [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85638000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5cde08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855b87c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85638000 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb019000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ac8f8c r4:84ac8c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ac8f8c r4:855d7780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85638000 r8:855d77ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855d7780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d7780 r8:8027ed34 r7:eb5c9e60 r6:855d7800 r5:85638000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5cdfb0 to 0xeb5cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855d5780 INFO: task kworker/1:757:5003 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 801d6000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:758:5005 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:758 state:D stack:0 pid:5005 tgid:5005 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb5d1d84 r8:00000002 r7:60000013 r6:eb5d1d8c r5:8563b000 r4:8563b000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8563b000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf6480 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) INFO: task kworker/1:758:5005 is blocked on a mutex likely owned by task kworker/0:78:3501. 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf60c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85639800 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb03d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ac938c r4:84ac9000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ac938c r4:855d7980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85639800 r8:855d79ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855d7980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d7980 r8:8027ed34 r7:eb5d1e60 r6:855d7a00 r5:85639800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d5fb0 to 0xeb5d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855d5280 INFO: task kworker/1:759:5006 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 801d6000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r5:00001000 r4:dfe1f000 r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:760 state:D stack:0 pid:5009 tgid:5009 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf6280 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8563c800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb067000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ac978c r4:84ac9400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ac978c r4:855d7a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8563c800 r8:855d7aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855d7a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d7a80 r8:8027ed34 r7:eb5d1e60 r6:855d7b00 r5:8563c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d9fb0 to 0xeb5d9ff8) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:dff95dc0 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:761:5012 blocked for more than 477 seconds. r5:8563d400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5dde08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf6500 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8563d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb167000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ac9f8c r4:84ac9c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ac9f8c r4:855d7b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8563d400 r8:855d7bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855d7b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d7b80 r8:8027ed34 r7:eb5d1e60 r6:855d7c00 r5:8563d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5ddfb0 to 0xeb5ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 INFO: task kworker/1:761:5012 is blocked on a mutex likely owned by task kworker/0:78:3501. r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 801d6000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:762:5013 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:762 state:D stack:0 pid:5013 tgid:5013 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb5e1d84 r8:00000002 r7:60000013 r6:eb5e1d8c r5:854d1800 r4:854d1800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854d1800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5e1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf6740 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854d1800 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb177000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84aca38c r4:84aca000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84aca38c r4:855d7c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854d1800 r8:855d7cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855d7c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d7c80 r8:8027ed34 r7:eb5dde60 r6:855b5e00 r5:854d1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5e1fb0 to 0xeb5e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf65c0 INFO: task kworker/1:762:5013 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xdff95fb0 to 0xdff95ff8) INFO: task kworker/1:763:5015 blocked for more than 477 seconds. Call trace: [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf6840 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb18f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84aca78c r4:84aca400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84aca78c r4:855d7d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854d3000 r8:855d7d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855d7d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d7d00 r8:8027ed34 r7:eb5e1e60 r6:855b5e80 r5:854d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5e9fb0 to 0xeb5e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf6700 INFO: task kworker/1:763:5015 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r5:80000013 r4:80239bd0 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:764 state:D stack:0 pid:5017 tgid:5017 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5f1e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:854d4800 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1c5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb38c r4:84acb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb38c r4:855d7d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854d4800 r8:855d7dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855d7d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d7d80 r8:8027ed34 r7:eb5e9e60 r6:855b5f00 r5:854d4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf67c0 INFO: task kworker/1:764:5017 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 801d6000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 80000013 ffffffff r5:80000013 r4:80239bd0 r4:dff95dc0 r4:00000000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:765 state:D stack:0 pid:5018 tgid:5018 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf67c0 INFO: task kworker/1:765:5018 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 801d6000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:766:5020 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:766 state:D stack:0 pid:5020 tgid:5020 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb5c5d84 r8:00000002 r7:60000013 r6:eb5c5d8c r5:8563e000 r4:8563e000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8563e000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf6b00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8563e000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1b1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:855d7e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8563e000 r8:855d7eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:855d7e80 r8:8027ed34 r7:eb5f1e60 r6:855d7f00 r5:8563e000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:767:5023 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:767 state:D stack:0 pid:5023 tgid:5023 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb5e5d84 r8:00000002 r7:60000113 r6:eb5e5d8c r5:8563bc00 r4:8563bc00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8563bc00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5e5e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:855d7f80 r8:8027ed34 r7:eb5f1e60 r6:855d7200 r5:8563bc00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 r5:80000013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:768:5025 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:768 state:D stack:0 pid:5025 tgid:5025 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb601d84 r8:00000002 r7:60000113 r6:eb601d8c r5:854d2400 r4:854d2400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854d2400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb601e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855b8e00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854d2400 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb345000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acbb8c r4:84acb800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acbb8c r4:84bdc000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854d2400 r8:84bdc02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bdc000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdc000 r8:8027ed34 r7:eb5e5e60 r6:84bce000 r5:854d2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb601fb0 to 0xeb601ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bdc080 Exception stack(0xeb605fb0 to 0xeb605ff8) r4:84bd6080 task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 801d6000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:770:5029 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:770 state:D stack:0 pid:5029 tgid:5029 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:829185c4 r9:eb609d84 r8:00000002 r7:60000013 r6:eb609d8c r5:854d6000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb609e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bdc100 r8:8027ed34 r7:eb605e60 r6:84bce100 r5:854d6000 Exception stack(0xeb609fb0 to 0xeb609ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bd6080 INFO: task kworker/1:770:5029 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 801d6000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:771:5031 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:771 state:D stack:0 pid:5031 tgid:5031 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb60dd84 r8:00000002 r7:60000113 r6:eb60dd8c r5:854d3c00 r4:854d3c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854d3c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb60de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd6240 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854d3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb365000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:855e038c r4:84bdc180 Exception stack(0xeb60dfb0 to 0xeb60dff8) r4:84bd6100 Workqueue: events bpf_prog_free_deferred 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:dfe1f000 r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:772:5033 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:772 state:D stack:0 pid:5033 tgid:5033 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb611d84 r8:00000002 r7:60000113 r6:eb611d8c r5:854d0000 r4:854d0000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854d0000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb611e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd6580 r9:83018205 r8:854d0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 r10:61c88647 r9:854d0000 r8:84bdc22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 801d6000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:773:5034 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:773 state:D stack:0 pid:5034 tgid:5034 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb615d84 r8:00000002 r7:60000113 r6:eb615d8c r5:854d0c00 r4:854d0c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854d0c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb615e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd6440 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854d0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80000013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:774 state:D stack:0 pid:5037 tgid:5037 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb619d84 r8:00000002 r7:60000113 r6:eb619d8c r5:8476e000 r4:8476e000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8476e000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb619e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd6780 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8476e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3c9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855e138c r4:855e1000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855e138c r4:84bdc300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476e000 r8:84bdc32c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bdc300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdc300 r8:8027ed34 r7:eb611e60 r6:84bce300 r5:8476e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb619fb0 to 0xeb619ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bd64c0 INFO: task kworker/1:774:5037 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 801d6000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:775 state:D stack:0 pid:5039 tgid:5039 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb621e08 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84bdc380 r8:8027ed34 r7:eb619e60 r6:84bce380 r5:847d8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb621fb0 to 0xeb621ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bd6980 INFO: task kworker/1:775:5039 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 801d6000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:776:5041 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:776 state:D stack:0 pid:5041 tgid:5041 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb629d84 r8:00000002 r7:60000113 r6:eb629d8c r5:847da400 r4:847da400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847da400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb629e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b91580 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847da400 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab55000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855e438c r4:855e4000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855e438c r4:84bdc400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847da400 r8:84bdc42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bdc400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdc400 r8:8027ed34 r7:eb621e60 r6:84bce400 r5:847da400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb629fb0 to 0xeb629ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bd6800 INFO: task kworker/1:776:5041 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r5:00001000 r4:dfe1f000 r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 Exception stack(0xdff95fb0 to 0xdff95ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:777:5042 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:777 state:D stack:0 pid:5042 tgid:5042 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb62dd84 r8:00000002 r7:60000113 r6:eb62dd8c r5:847d8000 r4:847d8000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847d8000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb62de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd6a40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdc480 r8:8027ed34 r7:eb629e60 r6:84bce480 r5:847d8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb62dfb0 to 0xeb62dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bd6800 INFO: task kworker/1:777:5042 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 801d6000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 r5:00001000 r4:dfe1f000 r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:778 state:D stack:0 pid:5044 tgid:5044 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb635d84 r8:00000002 r7:60000113 r6:eb635d8c r5:847d9800 r4:847d9800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847d9800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb635e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd6b00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847d9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb40b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855e1f8c r4:855e1c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855e1f8c r4:84bdc500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r5:00001000 r4:dfe1f000 r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r4:847db000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847db000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb63de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd6c00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847db000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb42a000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855e238c r4:855e2000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855e238c r4:84bdc580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847db000 r8:84bdc5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bdc580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdc580 r8:8027ed34 r7:eb629e60 r6:84bce580 r5:847db000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb63dfb0 to 0xeb63dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bd6b40 INFO: task kworker/1:779:5046 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 801d6000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:780:5048 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:780 state:D stack:0 pid:5048 tgid:5048 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb645d84 r8:00000002 r7:60000113 r6:eb645d8c r5:847dbc00 r4:847dbc00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847dbc00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb645e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd6d80 r5:855e278c r4:855e2400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84bd6f00 Workqueue: events bpf_prog_free_deferred 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:781:5050 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:781 state:D stack:0 pid:5050 tgid:5050 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb64dd84 r8:00000002 r7:60000113 r6:eb64dd8c r5:847dc800 r4:847dc800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847dc800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb64de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850c9400 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847dc800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb449000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855e2b8c r4:855e2800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855e2b8c r4:84bdc680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847dc800 r8:84bdc6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bdc680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdc680 r8:8027ed34 r7:eb629e60 r6:84bce680 r5:847dc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb64dfb0 to 0xeb64dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bd6d00 INFO: task kworker/1:781:5050 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) Exception stack(0xdff95d20 to 0xdff95d68) 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb655e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd6f00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847dd400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb46b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855e2f8c r4:855e2c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855e2f8c r4:84bdc700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847dd400 r8:84bdc72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bdc700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdc700 r8:8027ed34 r7:eb629e60 r6:84bce700 r5:847dd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb655fb0 to 0xeb655ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850c93c0 INFO: task kworker/1:782:5052 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 801d6000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:783 state:D stack:0 pid:5054 tgid:5054 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb319e08 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:855e338c r4:855e3000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855e338c r4:84bdc780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847de000 r8:84bdc7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bdc780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdc780 r8:8027ed34 r7:eb629e60 r6:84bce780 r5:847de000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb319fb0 to 0xeb319ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bd6600 INFO: task kworker/1:783:5054 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 804e4000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:784:5056 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:784 state:D stack:0 pid:5056 tgid:5056 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb65dd84 r8:00000002 r7:60000113 r6:eb65dd8c r5:85610c00 r4:85610c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85610c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb65de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b91000 r5:00001000 r4:dfb53000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r5:00001000 r4:dfe1f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:785:5058 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:785 state:D stack:0 pid:5058 tgid:5058 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb529d84 r8:00000002 r7:60000113 r6:eb529d8c r5:8563a400 r4:8563a400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8563a400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb529e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b91280 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8563a400 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e084f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fa0: 00000000 00000000 00000000 00000000 r5:80000013 r4:80239bd0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:786:5062 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:786 state:D stack:0 pid:5062 tgid:5062 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb661d84 r8:00000002 r7:60000113 r6:eb661d8c r5:85640000 r4:85640000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85640000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb661e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b91380 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84bdc980 Exception stack(0xeb661fb0 to 0xeb661ff8) r4:84b91300 Workqueue: events bpf_prog_free_deferred 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:787:5064 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:787 state:D stack:0 pid:5064 tgid:5064 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb665d84 r8:00000002 r7:60000113 r6:eb665d8c r5:85612400 r4:85612400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85612400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb665e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b91680 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabd9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855e478c r4:855e4400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855e478c r4:84bdca80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85612400 r8:84bdcaac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bdca80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdca80 r8:8027ed34 r7:eb629e60 r6:84bce880 r5:85612400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb665fb0 to 0xeb665ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b91540 Workqueue: events bpf_prog_free_deferred Exception stack(0xdff95d20 to 0xdff95d68) 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xdff95fb0 to 0xdff95ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb66de08 r4:00000000 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84bdcb00 r8:8027ed34 r7:eb665e60 r6:84bce900 r5:85611800 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:789 state:D stack:0 pid:5067 tgid:5067 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb671e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b91780 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85613c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead9f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855e4b8c r4:855e4800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855e4b8c r4:84bdcb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85613c00 r8:84bdcbac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bdcb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdcb80 r8:8027ed34 r7:eb66de60 r6:84bce980 r5:85613c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb671fb0 to 0xeb671ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b918c0 INFO: task kworker/1:789:5067 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 804e4000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:790:5069 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:790 state:D stack:0 pid:5069 tgid:5069 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb679d84 r8:00000002 r7:60000013 r6:eb679d8c r5:85613000 r4:85613000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85613000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb679e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b91940 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85613000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadd7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855e4f8c r4:855e4c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855e4f8c r4:84bdcc00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85613000 r8:84bdcc2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bdcc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdcc00 r8:8027ed34 r7:eb66de60 r6:84bcea00 r5:85613000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb679fb0 to 0xeb679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b91700 INFO: task kworker/1:790:5069 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 804e4000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:791:5072 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:791 state:D stack:0 pid:5072 tgid:5072 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb681d84 r8:00000002 r7:60000013 r6:eb681d8c r5:85614800 r4:85614800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85614800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb681e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b91a00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85614800 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae0b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855e538c r4:855e5000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855e538c r4:84bdcc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85614800 r8:84bdccac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bdcc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdcc80 r8:8027ed34 r7:eb66de60 r6:84bcea80 r5:85614800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb681fb0 to 0xeb681ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b91b00 INFO: task kworker/1:791:5072 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 804e4000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:792:5073 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:792 state:D stack:0 pid:5073 tgid:5073 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb685d84 r8:00000002 r7:60000113 r6:eb685d8c r5:85616000 r4:85616000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85616000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb685e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b91c40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85616000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae63000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:855e578c r4:855e5400 r4:84bdcd00 Exception stack(0xeb685fb0 to 0xeb685ff8) r4:84b91a40 Workqueue: events bpf_prog_free_deferred Exception stack(0xdff95d20 to 0xdff95d68) 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:793:5075 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:793 state:D stack:0 pid:5075 tgid:5075 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:85616c00 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb689e08 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eae87000 r7:ddde2d40 r6:83018200 r5:855e5b8c r4:84bdcd80 Exception stack(0xeb689fb0 to 0xeb689ff8) r4:84b91c00 Workqueue: events bpf_prog_free_deferred 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:794:5077 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:794 state:D stack:0 pid:5077 tgid:5077 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb691d84 r8:00000002 r7:60000013 r6:eb691d8c r5:85610000 r4:85610000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85610000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb691e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b91e40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85610000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaebf000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855e5f8c r4:855e5c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855e5f8c r4:84bdce00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85610000 r8:84bdce2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bdce00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdce00 r8:8027ed34 r7:eb66de60 r6:84bcec00 r5:85610000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb691fb0 to 0xeb691ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b91d00 INFO: task kworker/1:794:5077 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 804e4000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:795:5080 blocked for more than 479 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:795 state:D stack:0 pid:5080 tgid:5080 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb69dd84 r8:00000002 r7:60000113 r6:eb69dd8c r5:85615400 r4:85615400 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85615400 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb69de08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b91f40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85615400 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb093000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855e638c r4:855e6000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855e638c r4:84bdce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85615400 r8:84bdceac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bdce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdce80 r8:8027ed34 r7:eb66de60 r6:84bcec80 r5:85615400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb69dfb0 to 0xeb69dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b91f00 INFO: task kworker/1:795:5080 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 804e4000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:796:5081 blocked for more than 479 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:796 state:D stack:0 pid:5081 tgid:5081 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb6a1d84 r8:00000002 r7:60000113 r6:eb6a1d8c r5:853e1800 r4:853e1800 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853e1800 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6a1e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be1040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853e1800 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb139000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855e678c r4:855e6400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855e678c r4:84bdcf00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e1800 r8:84bdcf2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bdcf00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdcf00 r8:8027ed34 r7:eb66de60 r6:84bced00 r5:853e1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdff95d20 to 0xdff95d68) r4:dff95dc0 r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:797:5083 blocked for more than 479 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:797 state:D stack:0 pid:5083 tgid:5083 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb6a9d84 r8:00000002 r7:60000113 r6:eb6a9d8c r5:85618c00 r4:85618c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85618c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6a9e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be1180 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85618c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb159000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855e6b8c r4:855e6800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855e6b8c r4:84bdcf80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85618c00 r8:84bdcfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bdcf80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdcf80 r8:8027ed34 r7:eb66de60 r6:84bced80 r5:85618c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6a9fb0 to 0xeb6a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be12c0 INFO: task kworker/1:797:5083 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:82abf1e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:798:5086 blocked for more than 479 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:798 state:D stack:0 pid:5086 tgid:5086 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb6b5d84 r8:00000002 r7:60000113 r6:eb6b5d8c r5:85618000 r4:85618000 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85618000 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6b5e08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be14c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85618000 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb287000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855e778c r4:855e7400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855e778c r4:84bcb000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85618000 r8:84bcb02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bcb000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bcb000 r8:8027ed34 r7:eb66de60 r6:84bcee00 r5:85618000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6b5fb0 to 0xeb6b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be1140 INFO: task kworker/1:798:5086 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 804e4000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9c1c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:799:5088 blocked for more than 479 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:799 state:D stack:0 pid:5088 tgid:5088 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28660>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a276d8>] (__schedule) from [<81a28660>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb5fdd84 r8:00000002 r7:60000013 r6:eb5fdd8c r5:85640c00 r4:85640c00 [<81a28634>] (schedule) from [<81a28a48>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85640c00 r4:829185c0 [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28a30>] (schedule_preempt_disabled) from [<81a2b12c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ae2c>] (__mutex_lock.constprop.0) from [<81a2b5f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5fde08 r4:00000000 [<81a2b5e4>] (__mutex_lock_slowpath) from [<81a2b638>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be1400 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85640c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb215000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855e738c r4:855e7000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855e738c r4:84bcb080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85640c00 r8:84bcb0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bcb080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bcb080 r8:8027ed34 r7:eb6b5e60 r6:84bcb100 r5:85640c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5fdfb0 to 0xeb5fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be1680 INFO: task kworker/1:799:5088 is blocked on a mutex likely owned by task kworker/0:78:3501. task:kworker/0:78 state:R running task stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a276d8>] (__schedule) from [<81a28a94>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:847e3000 r8:80200be4 r7:dff95d54 r6:ffffffff r5:847e3000 r4:00000000 [<81a28a54>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff95d20 to 0xdff95d68) 5d20: 804e4000 dfe0b000 00000001 80239bb8 7f161000 00000001 82abf1c4 82abe5a0 5d40: 7f161000 dfe0b000 8280c9b4 dff95d9c dff95da0 dff95d70 80230af4 80239bd0 5d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff95dc0 r5:dff95e08 r4:dff95dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9cf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495d38c r4:8495d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8495d38c r4:84a44080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84a440ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a44080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a44080 r8:8027ed34 r7:dff59e60 r6:84a44100 r5:847e3000 Exception stack(0xdff95fb0 to 0xdff95ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.16.0-rc1-syzkaller #0 Workqueue: events bpf_prog_free_deferred r10:829185c4 r9:eb6b1d84 r8:00000002 r7:60000113 r6:eb6b1d8c r5:85642400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6b1e08 r4:00000000 [<81a2b5fc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904)