Extracting prog: 12m42.10782834s Minimizing prog: 2h29m53.266692381s Simplifying prog options: 0s Extracting C: 9m13.107761893s Simplifying C: 1h0m7.249122582s extracting reproducer from 1 programs testing a last program of every proc single: executing 1 programs separately with timeout 45s testing program (duration=45s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-unlinkat-mmap-ftruncate-sendfile-sendfile-socket-getsockname$packet detailed listing: executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000002d0000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='tlb_flush\x00', r0}, 0x10) unlinkat(0xffffffffffffff9c, 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000003, 0x4c831, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000000) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, 0x0, 0x0) program did not crash single: failed to extract reproducer single: executing 1 programs separately with timeout 16m0s testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-unlinkat-mmap-ftruncate-sendfile-sendfile-socket-getsockname$packet detailed listing: executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000002d0000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='tlb_flush\x00', r0}, 0x10) unlinkat(0xffffffffffffff9c, 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000003, 0x4c831, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000000) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, 0x0, 0x0) program crashed: INFO: task hung in _vm_unmap_aliases single: successfully extracted reproducer found reproducer with 9 syscalls minimizing guilty program testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-unlinkat-mmap-ftruncate-sendfile-sendfile-socket detailed listing: executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000002d0000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='tlb_flush\x00', r0}, 0x10) unlinkat(0xffffffffffffff9c, 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000003, 0x4c831, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000000) socket(0x1, 0x803, 0x0) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-unlinkat-mmap-ftruncate-sendfile-sendfile detailed listing: executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000002d0000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='tlb_flush\x00', r0}, 0x10) unlinkat(0xffffffffffffff9c, 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000003, 0x4c831, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000000) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-unlinkat-mmap-ftruncate-sendfile detailed listing: executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000002d0000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='tlb_flush\x00', r0}, 0x10) unlinkat(0xffffffffffffff9c, 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000003, 0x4c831, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-unlinkat-mmap-ftruncate detailed listing: executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000002d0000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='tlb_flush\x00', r0}, 0x10) unlinkat(0xffffffffffffff9c, 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000003, 0x4c831, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-unlinkat-mmap detailed listing: executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000002d0000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='tlb_flush\x00', r0}, 0x10) unlinkat(0xffffffffffffff9c, 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000003, 0x4c831, 0xffffffffffffffff, 0x0) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-unlinkat detailed listing: executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000002d0000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='tlb_flush\x00', r0}, 0x10) unlinkat(0xffffffffffffff9c, 0x0, 0x0) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN detailed listing: executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000002d0000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='tlb_flush\x00', r0}, 0x10) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000002d0000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000002d0000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) program did not crash extracting C reproducer testing compiled C program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases simplifying C reproducer testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:false Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases reproducing took 3h51m55.731434657s repro crashed as (corrupted=false): INFO: task kworker/0:0:9 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:0 state:D stack:0 pid:9 tgid:9 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df83dd84 r8:00000002 r7:60000113 r6:df83dd8c r5:8323e000 r4:8323e000 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8323e000 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df83de08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b9e440 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8323e000 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af678c r4:84af6400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84af678c r4:830b8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8323e000 r8:830b842c r7:82804d40 r6:dddced40 r5:dddced60 r4:830b8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8400 r8:8027ed34 r7:df819e48 r6:830b8480 r5:8323e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf83dfb0 to 0xdf83dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:830b6180 INFO: task kworker/0:0:9 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: b50bc000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 INFO: task kworker/1:3:98 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:3 state:D stack:0 pid:98 tgid:98 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df9b5d84 r8:00000002 r7:60000113 r6:df9b5d8c r5:83891800 r4:83891800 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83891800 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9b5e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856981c0 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83891800 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec505000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85825f8c r4:85825c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85825f8c r4:83929080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83891800 r8:839290ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:83929080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83929080 r8:8027ed34 r7:df9a9e60 r6:83929100 r5:83891800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9b5fb0 to 0xdf9b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:83926300 INFO: task kworker/1:3:98 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: b5465000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 INFO: task kworker/0:1:3100 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1 state:D stack:0 pid:3100 tgid:3100 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df9b1d84 r8:00000002 r7:60000113 r6:df9b1d8c r5:838b2400 r4:838b2400 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:838b2400 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9b1e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a82b80 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:838b2400 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e044d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af638c r4:84af6000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84af638c r4:8473bf80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838b2400 r8:8473bfac r7:82804d40 r6:dddced40 r5:dddced60 r4:8473bf80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473bf80 r8:8027ed34 r7:df83de60 r6:8473be00 r5:838b2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9b1fb0 to 0xdf9b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84237940 INFO: task kworker/0:1:3100 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: b5894000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 INFO: task kworker/1:4:3113 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:4 state:D stack:0 pid:3113 tgid:3113 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df9d5d84 r8:00000002 r7:60000013 r6:df9d5d8c r5:83b55400 r4:83b55400 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83b55400 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d5e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ffc00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83b55400 r7:00000000 r6:83018200 r5:00001000 r4:7f00f000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb6b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850aff8c r4:850afc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850aff8c r4:84734e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b55400 r8:84734e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84734e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84734e00 r8:8027ed34 r7:df9c5e60 r6:8473b880 r5:83b55400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9d5fb0 to 0xdf9d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84736380 INFO: task kworker/1:4:3113 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: b5894000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 INFO: task kworker/0:3:3115 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:3 state:D stack:0 pid:3115 tgid:3115 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df9d9d84 r8:00000002 r7:60000113 r6:df9d9d8c r5:8444bc00 r4:8444bc00 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8444bc00 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d9e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b71a40 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8444bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f011000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df951000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af778c r4:84af7400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84af778c r4:8473bf00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8444bc00 r8:8473bf2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8473bf00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473bf00 r8:8027ed34 r7:df83de60 r6:8473b900 r5:8444bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9d9fb0 to 0xdf9d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8472a340 INFO: task kworker/0:3:3115 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: b5ce4000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 INFO: task kworker/1:5:3116 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:5 state:D stack:0 pid:3116 tgid:3116 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df9ddd84 r8:00000002 r7:60000113 r6:df9ddd8c r5:83b53000 r4:83b53000 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83b53000 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9dde08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ff4c0 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83b53000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8ef000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850bbf8c r4:850bbc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850bbf8c r4:84734d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b53000 r8:84734dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84734d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84734d80 r8:8027ed34 r7:df9d5e60 r6:830b8600 r5:83b53000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84736380 INFO: task kworker/1:5:3116 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: b5fbe000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 INFO: task kworker/0:4:3119 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:4 state:D stack:0 pid:3119 tgid:3119 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df9d1d84 r8:00000002 r7:60000113 r6:df9d1d8c r5:84182400 r4:84182400 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84182400 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d1e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a98a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84182400 r7:00000000 r6:83018000 r5:00001000 r4:7f00f000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df99d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851afb8c r4:851af800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851afb8c r4:830b8500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84182400 r8:830b852c r7:82804d40 r6:dddced40 r5:dddced60 r4:830b8500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8500 r8:8027ed34 r7:df9d9e60 r6:840bb580 r5:84182400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9d1fb0 to 0xdf9d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8472a900 INFO: task kworker/0:4:3119 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: b62c1000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 INFO: task kworker/0:5:3121 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:5 state:D stack:0 pid:3121 tgid:3121 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df9b9d84 r8:00000002 r7:60000113 r6:df9b9d8c r5:84185400 r4:84185400 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84185400 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9b9e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85003840 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84185400 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df99b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be0b8c r4:84be0800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84be0b8c r4:83c6f480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84185400 r8:83c6f4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:83c6f480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83c6f480 r8:8027ed34 r7:df9d1e60 r6:84318e80 r5:84185400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9b9fb0 to 0xdf9b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8472ad00 INFO: task kworker/0:5:3121 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: b6604000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 INFO: task kworker/0:6:3123 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:6 state:D stack:0 pid:3123 tgid:3123 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ec431d84 r8:00000002 r7:60000113 r6:ec431d8c r5:84036000 r4:84036000 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84036000 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec431e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:841b92c0 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84036000 r7:00000000 r6:83018000 r5:00001000 r4:7f00f000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df98f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be238c r4:84be2000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84be238c r4:844e0b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84036000 r8:844e0b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:844e0b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844e0b00 r8:8027ed34 r7:df9d1e60 r6:845eb700 r5:84036000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec431fb0 to 0xec431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8472abc0 INFO: task kworker/0:6:3123 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: b6c3e000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 INFO: task kworker/1:6:3125 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:6 state:D stack:0 pid:3125 tgid:3125 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa01d84 r8:00000002 r7:60000113 r6:dfa01d8c r5:84180c00 r4:84180c00 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84180c00 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa01e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85698400 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84180c00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5fd000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8582678c r4:85826400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8582678c r4:84734900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84180c00 r8:8473492c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84734900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84734900 r8:8027ed34 r7:df9d5e60 r6:845eb500 r5:84180c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa01fb0 to 0xdfa01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84736ac0 INFO: task kworker/1:6:3125 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: b6c60000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:7:3126 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:7 state:D stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa05d84 r8:00000002 r7:60000113 r6:dfa05d8c r5:8323ec00 r4:8323ec00 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8323ec00 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa05e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510b080 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8323ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9e1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851ad78c r4:851ad400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851ad78c r4:8426cb00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8323ec00 r8:8426cb2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8426cb00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8426cb00 r8:8027ed34 r7:df9d1e60 r6:8426c900 r5:8323ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa05fb0 to 0xdfa05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8472a640 INFO: task kworker/0:7:3126 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: b6f50000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:7:3128 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:7 state:D stack:0 pid:3128 tgid:3128 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df9e5d84 r8:00000002 r7:60000113 r6:df9e5d8c r5:83b65400 r4:83b65400 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83b65400 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e5e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b904c0 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83b65400 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac5d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856b138c r4:856b1000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856b138c r4:84734980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b65400 r8:847349ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84734980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84734980 r8:8027ed34 r7:dfa01e60 r6:84734a00 r5:83b65400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84736ac0 INFO: task kworker/1:7:3128 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: b74a2000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:8:3131 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:8 state:D stack:0 pid:3131 tgid:3131 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa19d84 r8:00000002 r7:60000113 r6:dfa19d8c r5:8324a400 r4:8324a400 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8324a400 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa19e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84786080 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8324a400 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0001000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516778c r4:85167400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8516778c r4:8426ca80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8324a400 r8:8426caac r7:82804d40 r6:dddced40 r5:dddced60 r4:8426ca80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8426ca80 r8:8027ed34 r7:df9d1e60 r6:84734a80 r5:8324a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa19fb0 to 0xdfa19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8472a300 INFO: task kworker/0:8:3131 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: b7925000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:9:3133 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:3133 tgid:3133 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa2dd84 r8:00000002 r7:60000113 r6:dfa2dd8c r5:833a8000 r4:833a8000 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:833a8000 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa2de08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510d500 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:833a8000 r7:00000000 r6:83018000 r5:00001000 r4:7f011000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9eb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851d078c r4:851d0400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851d078c r4:84785100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833a8000 r8:8478512c r7:82804d40 r6:dddced40 r5:dddced60 r4:84785100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84785100 r8:8027ed34 r7:dfa19e60 r6:84734b80 r5:833a8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa2dfb0 to 0xdfa2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8472ae80 INFO: task kworker/0:9:3133 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: b7925000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:10:3134 blocked for more than 450 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:3134 tgid:3134 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa35d84 r8:00000002 r7:60000113 r6:dfa35d8c r5:8324c800 r4:8324c800 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8324c800 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa35e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a55800 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8324c800 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0507000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85555f8c r4:85555c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85555f8c r4:84785000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8324c800 r8:8478502c r7:82804d40 r6:dddced40 r5:dddced60 r4:84785000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84785000 r8:8027ed34 r7:dfa19e60 r6:84734c00 r5:8324c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa35fb0 to 0xdfa35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8472ae80 INFO: task kworker/0:10:3134 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: b82ed000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:11:3136 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3136 tgid:3136 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa49d84 r8:00000002 r7:60000113 r6:dfa49d8c r5:83bb0000 r4:83bb0000 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83bb0000 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa49e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85346b80 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83bb0000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0675000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b0f8c r4:852b0c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852b0f8c r4:84785080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83bb0000 r8:847850ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84785080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84785080 r8:8027ed34 r7:dfa35e60 r6:84734c80 r5:83bb0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa49fb0 to 0xdfa49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84786180 INFO: task kworker/0:11:3136 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: b86d9000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:12:3138 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3138 tgid:3138 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa55d84 r8:00000002 r7:60000113 r6:dfa55d8c r5:83bb3000 r4:83bb3000 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83bb3000 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa55e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85346e80 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83bb3000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e882b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b338c r4:852b3000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852b338c r4:84785180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83bb3000 r8:847851ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84785180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84785180 r8:8027ed34 r7:dfa35e60 r6:84734d00 r5:83bb3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa55fb0 to 0xdfa55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84786100 INFO: task kworker/0:12:3138 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: b8ecf000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:13:3140 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:13 state:D stack:0 pid:3140 tgid:3140 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa65d84 r8:00000002 r7:60000113 r6:dfa65d8c r5:83bb0c00 r4:83bb0c00 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83bb0c00 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa65e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85024900 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83bb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaca3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b3f8c r4:852b3c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852b3f8c r4:84785280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83bb0c00 r8:847852ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84785280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84785280 r8:8027ed34 r7:dfa35e60 r6:84734b00 r5:83bb0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa65fb0 to 0xdfa65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84786400 INFO: task kworker/0:13:3140 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: b91a4000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:14:3142 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:3142 tgid:3142 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa6dd84 r8:00000002 r7:60000113 r6:dfa6dd8c r5:83bb6000 r4:83bb6000 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83bb6000 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa6de08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85448980 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83bb6000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd81000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853c478c r4:853c4400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:853c478c r4:84785300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83bb6000 r8:8478532c r7:82804d40 r6:dddced40 r5:dddced60 r4:84785300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84785300 r8:8027ed34 r7:dfa35e60 r6:84734800 r5:83bb6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa6dfb0 to 0xdfa6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84786380 INFO: task kworker/0:14:3142 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: b9477000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:15:3144 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:3144 tgid:3144 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa79d84 r8:00000002 r7:60000113 r6:dfa79d8c r5:838ba400 r4:838ba400 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:838ba400 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa79e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516b8c0 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:838ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8547778c r4:85477400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8547778c r4:84785200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838ba400 r8:8478522c r7:82804d40 r6:dddced40 r5:dddced60 r4:84785200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84785200 r8:8027ed34 r7:dfa35e60 r6:84734380 r5:838ba400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa79fb0 to 0xdfa79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84786500 INFO: task kworker/0:15:3144 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: b97ae000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:16:3146 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:16 state:D stack:0 pid:3146 tgid:3146 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa89d84 r8:00000002 r7:60000113 r6:dfa89d8c r5:838be000 r4:838be000 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:838be000 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa89e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85010ec0 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:838be000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e077d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853c678c r4:853c6400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:853c678c r4:84785400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838be000 r8:8478542c r7:82804d40 r6:dddced40 r5:dddced60 r4:84785400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84785400 r8:8027ed34 r7:dfa35e60 r6:84734400 r5:838be000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa89fb0 to 0xdfa89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84786680 INFO: task kworker/0:16:3146 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: b9a97000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:17:3148 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:17 state:D stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa9dd84 r8:00000002 r7:60000113 r6:dfa9dd8c r5:8444e000 r4:8444e000 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8444e000 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa9de08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545aa40 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8444e000 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac19000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853c7b8c r4:853c7800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:853c7b8c r4:84785480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8444e000 r8:847854ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84785480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84785480 r8:8027ed34 r7:dfa35e60 r6:84734480 r5:8444e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa9dfb0 to 0xdfa9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847867c0 INFO: task kworker/0:17:3148 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: b9dae000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:18:3150 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:18 state:D stack:0 pid:3150 tgid:3150 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfaa5d84 r8:00000002 r7:60000113 r6:dfaa5d8c r5:838bd400 r4:838bd400 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:838bd400 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa5e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8542ea80 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:838bd400 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8807000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854deb8c r4:854de800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854deb8c r4:84785380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838bd400 r8:847853ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84785380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84785380 r8:8027ed34 r7:dfa35e60 r6:84734500 r5:838bd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa5fb0 to 0xdfaa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847868c0 INFO: task kworker/0:18:3150 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: b9dae000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:19:3152 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:19 state:D stack:0 pid:3152 tgid:3152 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfab1d84 r8:00000002 r7:60000013 r6:dfab1d8c r5:838b8000 r4:838b8000 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:838b8000 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab1e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85370b00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:838b8000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03d1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555778c r4:85557400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8555778c r4:84785500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838b8000 r8:8478552c r7:82804d40 r6:dddced40 r5:dddced60 r4:84785500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84785500 r8:8027ed34 r7:dfa35e60 r6:84734580 r5:838b8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab1fb0 to 0xdfab1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84786a00 INFO: task kworker/0:19:3152 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: ba789000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:20:3155 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:20 state:D stack:0 pid:3155 tgid:3155 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfac9d84 r8:00000002 r7:60000113 r6:dfac9d8c r5:84461800 r4:84461800 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84461800 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac9e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84736c80 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84461800 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb08b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856d478c r4:856d4400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856d478c r4:84785600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84461800 r8:8478562c r7:82804d40 r6:dddced40 r5:dddced60 r4:84785600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84785600 r8:8027ed34 r7:dfab1e60 r6:84734600 r5:84461800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfac9fb0 to 0xdfac9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84786b40 INFO: task kworker/0:20:3155 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: ba8d2000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:21:3156 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:21 state:D stack:0 pid:3156 tgid:3156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfad5d84 r8:00000002 r7:60000113 r6:dfad5d8c r5:84460000 r4:84460000 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84460000 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad5e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a80600 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84460000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0607000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8557138c r4:85571000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8557138c r4:84785580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84460000 r8:847855ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84785580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84785580 r8:8027ed34 r7:dfac9e60 r6:84734680 r5:84460000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad5fb0 to 0xdfad5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84786d80 INFO: task kworker/0:21:3156 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: badc0000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:8:3160 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:8 state:D stack:0 pid:3160 tgid:3160 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df9fdd84 r8:00000002 r7:60000113 r6:df9fdd8c r5:84462400 r4:84462400 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84462400 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9fde08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85763640 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84462400 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb37f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8561db8c r4:8561d800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8561db8c r4:84734700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84462400 r8:8473472c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84734700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84734700 r8:8027ed34 r7:dfa01e60 r6:84734300 r5:84462400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9fdfb0 to 0xdf9fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8422bf40 INFO: task kworker/1:8:3160 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: bb4b0000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:9:3162 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:9 state:D stack:0 pid:3162 tgid:3162 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfae9d84 r8:00000002 r7:60000113 r6:dfae9d8c r5:84463c00 r4:84463c00 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84463c00 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae9e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85698340 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84463c00 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec533000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8582638c r4:85826000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8582638c r4:84734000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84463c00 r8:8473402c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84734000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84734000 r8:8027ed34 r7:dfa01e60 r6:84734280 r5:84463c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae9fb0 to 0xdfae9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8422b980 INFO: task kworker/1:9:3162 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: bb651000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:22:3163 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:22 state:D stack:0 pid:3163 tgid:3163 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfaf5d84 r8:00000002 r7:60000113 r6:dfaf5d8c r5:84464800 r4:84464800 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84464800 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf5e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8562ff00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84464800 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec465000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856d538c r4:856d5000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856d538c r4:84785700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84464800 r8:8478572c r7:82804d40 r6:dddced40 r5:dddced60 r4:84785700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84785700 r8:8027ed34 r7:dfac9e60 r6:84734200 r5:84464800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf5fb0 to 0xdfaf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84786f40 INFO: task kworker/0:22:3163 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: bbc8c000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:23:3165 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:23 state:D stack:0 pid:3165 tgid:3165 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb01d84 r8:00000002 r7:60000113 r6:dfb01d8c r5:84466000 r4:84466000 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84466000 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb01e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a7e40 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84466000 r7:00000000 r6:83018000 r5:00001000 r4:7f0e7000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccd5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856d7f8c r4:856d7c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856d7f8c r4:84785780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84466000 r8:847857ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84785780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84785780 r8:8027ed34 r7:dfaf5e60 r6:84734080 r5:84466000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb01fb0 to 0xdfb01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8479d080 INFO: task kworker/0:23:3165 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: bc18e000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:24:3167 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:24 state:D stack:0 pid:3167 tgid:3167 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb11d84 r8:00000002 r7:60000113 r6:dfb11d8c r5:84465400 r4:84465400 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84465400 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb11e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857e7640 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84465400 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856d5b8c r4:856d5800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856d5b8c r4:84785680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84465400 r8:847856ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84785680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84785680 r8:8027ed34 r7:dfb01e60 r6:84734100 r5:84465400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb11fb0 to 0xdfb11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8479d1c0 INFO: task kworker/0:24:3167 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: bc7bf000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:25:3168 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:25 state:D stack:0 pid:3168 tgid:3168 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb15d84 r8:00000002 r7:60000113 r6:dfb15d8c r5:84466c00 r4:84466c00 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84466c00 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb15e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8479d080 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84466c00 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec2bd000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856d738c r4:856d7000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856d738c r4:84785880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84466c00 r8:847858ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84785880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84785880 r8:8027ed34 r7:dfb01e60 r6:84734180 r5:84466c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb15fb0 to 0xdfb15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8479d1c0 INFO: task kworker/0:25:3168 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: bc9cf000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:26:3170 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:26 state:D stack:0 pid:3170 tgid:3170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb1dd84 r8:00000002 r7:60000113 r6:dfb1dd8c r5:84463000 r4:84463000 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84463000 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb1de08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a7980 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84463000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecae5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856d7b8c r4:856d7800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856d7b8c r4:84785800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84463000 r8:8478582c r7:82804d40 r6:dddced40 r5:dddced60 r4:84785800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84785800 r8:8027ed34 r7:dfb01e60 r6:84734f00 r5:84463000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb1dfb0 to 0xdfb1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8479d140 INFO: task kworker/0:26:3170 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: bd1b3000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:27:3172 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:27 state:D stack:0 pid:3172 tgid:3172 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb29d84 r8:00000002 r7:60000013 r6:dfb29d8c r5:84a28000 r4:84a28000 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a28000 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb29e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85804cc0 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a28000 r7:00000000 r6:83018000 r5:00001000 r4:7f1bb000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec897000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8596c38c r4:8596c000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8596c38c r4:84785900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a28000 r8:8478592c r7:82804d40 r6:dddced40 r5:dddced60 r4:84785900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84785900 r8:8027ed34 r7:dfb1de60 r6:84734f80 r5:84a28000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb29fb0 to 0xdfb29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8479d380 INFO: task kworker/0:27:3172 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: bd4ce000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:28:3174 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:28 state:D stack:0 pid:3174 tgid:3174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb39d84 r8:00000002 r7:60000113 r6:dfb39d8c r5:84a29800 r4:84a29800 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a29800 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb39e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a7440 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a29800 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7f5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847d778c r4:847d7400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:847d778c r4:84785a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a29800 r8:84785a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84785a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84785a00 r8:8027ed34 r7:dfb29e60 r6:83349880 r5:84a29800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb39fb0 to 0xdfb39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8479d440 INFO: task kworker/0:28:3174 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: bd641000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:29:3176 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:29 state:D stack:0 pid:3176 tgid:3176 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb4dd84 r8:00000002 r7:60000113 r6:dfb4dd8c r5:84a28c00 r4:84a28c00 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a28c00 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb4de08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85669100 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a28c00 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7bb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847d7b8c r4:847d7800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:847d7b8c r4:84785a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a28c00 r8:84785aac r7:82804d40 r6:dddced40 r5:dddced60 r4:84785a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84785a80 r8:8027ed34 r7:dfb29e60 r6:83349800 r5:84a28c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb4dfb0 to 0xdfb4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8479d580 INFO: task kworker/0:29:3176 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: bd9b5000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:30:3178 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:30 state:D stack:0 pid:3178 tgid:3178 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb55d84 r8:00000002 r7:60000113 r6:dfb55d8c r5:84a2a400 r4:84a2a400 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a2a400 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb55e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ed3c0 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a2a400 r7:00000000 r6:83018000 r5:00001000 r4:7f13d000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb603000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847d678c r4:847d6400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:847d678c r4:84785980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a2a400 r8:847859ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84785980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84785980 r8:8027ed34 r7:dfb29e60 r6:8421e600 r5:84a2a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb55fb0 to 0xdfb55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8479d6c0 INFO: task kworker/0:30:3178 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: bde1c000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:31:3180 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:31 state:D stack:0 pid:3180 tgid:3180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb69d84 r8:00000002 r7:60000113 r6:dfb69d8c r5:84a2c800 r4:84a2c800 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a2c800 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb69e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ed640 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a2c800 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb43000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847d7f8c r4:847d7c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:847d7f8c r4:84785b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a2c800 r8:84785bac r7:82804d40 r6:dddced40 r5:dddced60 r4:84785b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84785b80 r8:8027ed34 r7:dfb29e60 r6:8421e580 r5:84a2c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb69fb0 to 0xdfb69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8479d840 INFO: task kworker/0:31:3180 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: bde1c000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:32:3182 blocked for more than 451 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:32 state:D stack:0 pid:3182 tgid:3182 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb75d84 r8:00000002 r7:60000113 r6:dfb75d8c r5:84a2bc00 r4:84a2bc00 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a2bc00 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb75e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ed2c0 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a2bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f1d5000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecad3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85963b8c r4:85963800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85963b8c r4:84785c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a2bc00 r8:84785c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84785c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84785c00 r8:8027ed34 r7:dfb29e60 r6:83ffaa00 r5:84a2bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb75fb0 to 0xdfb75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8479d940 INFO: task kworker/0:32:3182 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: be928000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:10:3188 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:10 state:D stack:0 pid:3188 tgid:3188 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df9f5d84 r8:00000002 r7:60000113 r6:df9f5d8c r5:84a2b000 r4:84a2b000 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a2b000 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f5e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856987c0 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a2b000 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec759000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8582738c r4:85827000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8582738c r4:8390ab80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a2b000 r8:8390abac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8390ab80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8390ab80 r8:8027ed34 r7:dfa01e60 r6:8390a380 r5:84a2b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f5fb0 to 0xdf9f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8478dc00 INFO: task kworker/1:10:3188 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: be928000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:11:3189 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:3189 tgid:3189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfac5d84 r8:00000002 r7:60000013 r6:dfac5d8c r5:84a2e000 r4:84a2e000 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a2e000 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac5e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85698500 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a2e000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec625000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85826b8c r4:85826800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85826b8c r4:8390a400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a2e000 r8:8390a42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8390a400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8390a400 r8:8027ed34 r7:df9f5e60 r6:8390ab00 r5:84a2e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfac5fb0 to 0xdfac5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8478dc00 INFO: task kworker/1:11:3189 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: bed32000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:12:3192 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:12 state:D stack:0 pid:3192 tgid:3192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb8dd84 r8:00000002 r7:60000113 r6:dfb8dd8c r5:84a2ec00 r4:84a2ec00 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a2ec00 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb8de08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85698700 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a2ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec655000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85826f8c r4:85826c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85826f8c r4:830cd100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a2ec00 r8:830cd12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:830cd100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd100 r8:8027ed34 r7:df9f5e60 r6:830cd400 r5:84a2ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb8dfb0 to 0xdfb8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8478df80 INFO: task kworker/1:12:3192 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: beeb4000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:13:3196 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:13 state:D stack:0 pid:3196 tgid:3196 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfba1d84 r8:00000002 r7:60000113 r6:dfba1d8c r5:84a30000 r4:84a30000 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a30000 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba1e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85698900 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a30000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec779000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8582778c r4:85827400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8582778c r4:83ffa980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a30000 r8:83ffa9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:83ffa980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ffa980 r8:8027ed34 r7:df9f5e60 r6:8391b800 r5:84a30000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfba1fb0 to 0xdfba1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8478d440 INFO: task kworker/1:13:3196 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: bf200000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:14:3198 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:14 state:D stack:0 pid:3198 tgid:3198 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfbadd84 r8:00000002 r7:60000013 r6:dfbadd8c r5:84a30c00 r4:84a30c00 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a30c00 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbade08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85698b00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a30c00 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7b3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85827f8c r4:85827c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85827f8c r4:8391b780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a30c00 r8:8391b7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8391b780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8391b780 r8:8027ed34 r7:dfba1e60 r6:83359080 r5:84a30c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbadfb0 to 0xdfbadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8478d380 INFO: task kworker/1:14:3198 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: bf31c000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:15:3199 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:15 state:D stack:0 pid:3199 tgid:3199 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfbbdd84 r8:00000002 r7:60000113 r6:dfbbdd8c r5:84a31800 r4:84a31800 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a31800 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbbde08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856989c0 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a31800 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec797000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85827b8c r4:85827800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85827b8c r4:83359000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a31800 r8:8335902c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:83359000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83359000 r8:8027ed34 r7:dfbade60 r6:84a51000 r5:84a31800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbbdfb0 to 0xdfbbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8478d780 INFO: task kworker/1:15:3199 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: bf7cc000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:16:3202 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:16 state:D stack:0 pid:3202 tgid:3202 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfbb9d84 r8:00000002 r7:60000113 r6:dfbb9d8c r5:84a32400 r4:84a32400 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a32400 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb9e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85698bc0 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a32400 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7c9000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8582c38c r4:8582c000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8582c38c r4:84a51080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a32400 r8:84a510ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a51080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a51080 r8:8027ed34 r7:dfbade60 r6:84a51180 r5:84a32400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbb9fb0 to 0xdfbb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a53200 INFO: task kworker/1:16:3202 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: bf90f000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:17:3204 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:17 state:D stack:0 pid:3204 tgid:3204 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfbd1d84 r8:00000002 r7:60000113 r6:dfbd1d8c r5:84a33000 r4:84a33000 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a33000 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd1e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85698d00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a33000 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7e5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8582c78c r4:8582c400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8582c78c r4:84a51100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a33000 r8:84a5112c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a51100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a51100 r8:8027ed34 r7:dfbb9e60 r6:84a51200 r5:84a33000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd1fb0 to 0xdfbd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a53340 INFO: task kworker/1:17:3204 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: c00b2000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:18:3206 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:18 state:D stack:0 pid:3206 tgid:3206 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfbd9d84 r8:00000002 r7:60000113 r6:dfbd9d8c r5:84a33c00 r4:84a33c00 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a33c00 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd9e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85698dc0 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a33c00 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec96b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8582cb8c r4:8582c800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8582cb8c r4:84a51280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a33c00 r8:84a512ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a51280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a51280 r8:8027ed34 r7:dfbd1e60 r6:84a51380 r5:84a33c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd9fb0 to 0xdfbd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a53500 INFO: task kworker/1:18:3206 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: c02d1000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:19:3208 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:19 state:D stack:0 pid:3208 tgid:3208 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfbe5d84 r8:00000002 r7:60000013 r6:dfbe5d8c r5:84a34800 r4:84a34800 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a34800 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbe5e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85698f00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a34800 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec975000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8582cf8c r4:8582cc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8582cf8c r4:84a51300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a34800 r8:84a5132c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a51300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a51300 r8:8027ed34 r7:dfbd9e60 r6:84a51400 r5:84a34800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbe5fb0 to 0xdfbe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a53680 INFO: task kworker/1:19:3208 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: c044e000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:20:3210 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:20 state:D stack:0 pid:3210 tgid:3210 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfbedd84 r8:00000002 r7:60000113 r6:dfbedd8c r5:84a35400 r4:84a35400 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a35400 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbede08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857fd380 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a35400 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9a1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8582db8c r4:8582d800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8582db8c r4:84a51480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a35400 r8:84a514ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a51480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a51480 r8:8027ed34 r7:dfbe5e60 r6:84a51500 r5:84a35400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbedfb0 to 0xdfbedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a537c0 INFO: task kworker/1:20:3210 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: c0c0b000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:21:3212 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:21 state:D stack:0 pid:3212 tgid:3212 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfbf9d84 r8:00000002 r7:60000113 r6:dfbf9d8c r5:84a36000 r4:84a36000 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a36000 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf9e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f0e40 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a36000 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec98f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8582d78c r4:8582d400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8582d78c r4:84a51580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a36000 r8:84a515ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a51580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a51580 r8:8027ed34 r7:dfbede60 r6:84a51680 r5:84a36000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbf9fb0 to 0xdfbf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a53a00 INFO: task kworker/1:21:3212 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: c0d93000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:22:3214 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:22 state:D stack:0 pid:3214 tgid:3214 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfc01d84 r8:00000002 r7:60000113 r6:dfc01d8c r5:84a36c00 r4:84a36c00 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a36c00 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc01e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695040 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a36c00 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9ad000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856d778c r4:856d7400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856d778c r4:84a51600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a36c00 r8:84a5162c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a51600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a51600 r8:8027ed34 r7:dfbede60 r6:84a51780 r5:84a36c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc01fb0 to 0xdfc01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a53b00 INFO: task kworker/1:22:3214 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: c0f06000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:23:3216 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:23 state:D stack:0 pid:3216 tgid:3216 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfc0dd84 r8:00000002 r7:60000113 r6:dfc0dd8c r5:84a38000 r4:84a38000 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a38000 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc0de08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857e8100 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a38000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9c9000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8582df8c r4:8582dc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8582df8c r4:84a51700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a38000 r8:84a5172c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a51700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a51700 r8:8027ed34 r7:dfc01e60 r6:84a51880 r5:84a38000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc0dfb0 to 0xdfc0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a53c40 INFO: task kworker/1:23:3216 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: c11b7000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:24:3217 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:24 state:D stack:0 pid:3217 tgid:3217 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfbc5d84 r8:00000002 r7:60000113 r6:dfbc5d8c r5:84a38c00 r4:84a38c00 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a38c00 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc5e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857e8280 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a38c00 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9f3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8582e38c r4:8582e000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8582e38c r4:84a51800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a38c00 r8:84a5182c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a51800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a51800 r8:8027ed34 r7:dfc0de60 r6:84a51900 r5:84a38c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbc5fb0 to 0xdfbc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a53c40 INFO: task kworker/1:24:3217 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: c1486000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:25:3220 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:25 state:D stack:0 pid:3220 tgid:3220 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfc15d84 r8:00000002 r7:60000113 r6:dfc15d8c r5:84a39800 r4:84a39800 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a39800 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc15e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857e8340 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a39800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca0d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8582e78c r4:8582e400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8582e78c r4:84a51980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a39800 r8:84a519ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a51980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a51980 r8:8027ed34 r7:dfbc5e60 r6:84a51a00 r5:84a39800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc15fb0 to 0xdfc15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a53f80 INFO: task kworker/1:25:3220 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: c156b000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:114:3478 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:114 state:D stack:0 pid:3478 tgid:3478 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dff21d84 r8:00000002 r7:60000113 r6:dff21d8c r5:848d0c00 r4:848d0c00 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848d0c00 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff21e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8472a800 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848d0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff4b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af6b8c r4:84af6800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84af6b8c r4:84b6e280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d0c00 r8:84b6e2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b6e280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e280 r8:8027ed34 r7:dff19e60 r6:84b6e300 r5:848d0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff21fb0 to 0xdff21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b72580 INFO: task kworker/0:114:3478 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: c198e000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:115:3480 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:115 state:D stack:0 pid:3480 tgid:3480 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dff2dd84 r8:00000002 r7:60000113 r6:dff2dd8c r5:848d2400 r4:848d2400 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848d2400 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff2de08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b70c80 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848d2400 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acc38c r4:84acc000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84acc38c r4:84b6e200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d2400 r8:84b6e22c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b6e200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e200 r8:8027ed34 r7:dff21e60 r6:84b6e380 r5:848d2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff2dfb0 to 0xdff2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b70000 INFO: task kworker/0:115:3480 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: c1ec0000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:78:3491 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:78 state:D stack:0 pid:3491 tgid:3491 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dff59d84 r8:00000002 r7:60000013 r6:dff59d8c r5:848d6c00 r4:848d6c00 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848d6c00 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff59e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73c80 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfccb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb78c r4:84acb400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb78c r4:84b6f780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d6c00 r8:84b6f7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f780 r8:8027ed34 r7:dff41e60 r6:84b6e680 r5:848d6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff59fb0 to 0xdff59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73900 INFO: task kworker/1:78:3491 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: c1ec0000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:79:3493 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:79 state:D stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dff61d84 r8:00000002 r7:60000113 r6:dff61d8c r5:849e0c00 r4:849e0c00 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849e0c00 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff61e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb38c r4:84acb000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73ac0 INFO: task kworker/1:79:3493 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: c2104000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:80:3495 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:80 state:D stack:0 pid:3495 tgid:3495 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dff69d84 r8:00000002 r7:60000013 r6:dff69d8c r5:849e0000 r4:849e0000 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849e0000 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff69e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b52780 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e0000 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe15000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acdb8c r4:84acd800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acdb8c r4:84b6f680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0000 r8:84b6f6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f680 r8:8027ed34 r7:dff59e60 r6:84b6e780 r5:849e0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff69fb0 to 0xdff69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73c00 INFO: task kworker/1:80:3495 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: c234c000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:81:3497 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:81 state:D stack:0 pid:3497 tgid:3497 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dff71d84 r8:00000002 r7:60000113 r6:dff71d8c r5:849e1800 r4:849e1800 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849e1800 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff71e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73d80 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e1800 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfced000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acbb8c r4:84acb800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acbb8c r4:84b6f880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e1800 r8:84b6f8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f880 r8:8027ed34 r7:dff69e60 r6:84b6e800 r5:849e1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73b40 INFO: task kworker/1:81:3497 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: c25bc000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:82:3499 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:82 state:D stack:0 pid:3499 tgid:3499 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dff79d84 r8:00000002 r7:60000113 r6:dff79d8c r5:849e2400 r4:849e2400 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849e2400 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff79e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73ec0 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e2400 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd1b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acbf8c r4:84acbc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acbf8c r4:84b6fa00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e2400 r8:84b6fa2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6fa00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6fa00 r8:8027ed34 r7:dff69e60 r6:84b6e880 r5:849e2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff79fb0 to 0xdff79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73cc0 INFO: task kworker/1:82:3499 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: c282b000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:83:3501 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:83 state:D stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dff81d84 r8:00000002 r7:60000113 r6:dff81d8c r5:849e3000 r4:849e3000 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849e3000 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff81e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84725f00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e3000 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfda3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:845a038c r4:845a0000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:845a038c r4:84b6fa80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e3000 r8:84b6faac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6fa80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6fa80 r8:8027ed34 r7:dff69e60 r6:84b6e900 r5:849e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff81fb0 to 0xdff81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73e00 INFO: task kworker/1:83:3501 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: c2958000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:84:3503 blocked for more than 452 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:84 state:D stack:0 pid:3503 tgid:3503 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dff89d84 r8:00000002 r7:60000113 r6:dff89d8c r5:849e5400 r4:849e5400 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849e5400 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff89e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b52140 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acc78c r4:84acc400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acc78c r4:84b6f980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e5400 r8:84b6f9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f980 r8:8027ed34 r7:dff69e60 r6:84b6e980 r5:849e5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff89fb0 to 0xdff89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73f40 INFO: task kworker/1:84:3503 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: c2bce000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:116:3505 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:116 state:D stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dff85d84 r8:00000002 r7:60000113 r6:dff85d8c r5:849e3c00 r4:849e3c00 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849e3c00 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff85e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497ee00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849e3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfff5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84af5f8c r4:84af5c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84af5f8c r4:84b6ea00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e3c00 r8:84b6ea2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b6ea00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6ea00 r8:8027ed34 r7:dff21e60 r6:84b6eb00 r5:849e3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff85fb0 to 0xdff85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b70680 INFO: task kworker/0:116:3505 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: c2e7f000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:85:3508 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:85 state:D stack:0 pid:3508 tgid:3508 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dff95d84 r8:00000002 r7:60000113 r6:dff95d8c r5:849e4800 r4:849e4800 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849e4800 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff95e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b52240 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e4800 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84accb8c r4:84acc800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84accb8c r4:84b6fb00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e4800 r8:84b6fb2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6fb00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6fb00 r8:8027ed34 r7:dff69e60 r6:84b6ea80 r5:849e4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b52180 INFO: task kworker/1:85:3508 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: c2edc000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:86:3509 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:86 state:D stack:0 pid:3509 tgid:3509 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dff99d84 r8:00000002 r7:60000013 r6:dff99d8c r5:849e6000 r4:849e6000 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849e6000 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff99e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b52380 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e6000 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfde7000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84accf8c r4:84accc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84accf8c r4:84b6fb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e6000 r8:84b6fbac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6fb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6fb80 r8:8027ed34 r7:dff69e60 r6:84b6eb80 r5:849e6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff99fb0 to 0xdff99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b52180 INFO: task kworker/1:86:3509 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: c337c000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:87:3511 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:87 state:D stack:0 pid:3511 tgid:3511 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dffa1d84 r8:00000002 r7:60000113 r6:dffa1d8c r5:84b30000 r4:84b30000 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b30000 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffa1e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b52500 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b30000 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf9000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acd38c r4:84acd000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acd38c r4:84b6fc00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b30000 r8:84b6fc2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6fc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6fc00 r8:8027ed34 r7:dff69e60 r6:84b6ec00 r5:84b30000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffa1fb0 to 0xdffa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b522c0 INFO: task kworker/1:87:3511 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: c35c5000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:88:3513 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:88 state:D stack:0 pid:3513 tgid:3513 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dffa9d84 r8:00000002 r7:60000113 r6:dffa9d8c r5:84b31800 r4:84b31800 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b31800 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffa9e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b525c0 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b31800 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe03000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acd78c r4:84acd400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acd78c r4:84b6fc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b31800 r8:84b6fcac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6fc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6fc80 r8:8027ed34 r7:dff69e60 r6:84b6ec80 r5:84b31800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffa9fb0 to 0xdffa9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b52440 INFO: task kworker/1:88:3513 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: c38e8000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:89:3515 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:89 state:D stack:0 pid:3515 tgid:3515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dffb1d84 r8:00000002 r7:60000113 r6:dffb1d8c r5:84b30c00 r4:84b30c00 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b30c00 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffb1e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b52b40 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b30c00 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe4f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ace78c r4:84ace400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ace78c r4:84b6f900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b30c00 r8:84b6f92c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f900 r8:8027ed34 r7:dff69e60 r6:84b6ed00 r5:84b30c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffb1fb0 to 0xdffb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b52580 INFO: task kworker/1:89:3515 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: c3a7b000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:90:3517 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:90 state:D stack:0 pid:3517 tgid:3517 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dffb9d84 r8:00000002 r7:60000113 r6:dffb9d8c r5:84b32400 r4:84b32400 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b32400 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffb9e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b52880 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b32400 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe2b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acdf8c r4:84acdc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acdf8c r4:84b6fd00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b32400 r8:84b6fd2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6fd00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6fd00 r8:8027ed34 r7:dffb1e60 r6:84b6ed80 r5:84b32400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffb9fb0 to 0xdffb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b528c0 INFO: task kworker/1:90:3517 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: c3c17000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:91:3519 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:91 state:D stack:0 pid:3519 tgid:3519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dffc1d84 r8:00000002 r7:60000113 r6:dffc1d8c r5:84b33000 r4:84b33000 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b33000 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffc1e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b52a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b33000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe35000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ace38c r4:84ace000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ace38c r4:84b6fd80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b33000 r8:84b6fdac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6fd80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6fd80 r8:8027ed34 r7:dffb1e60 r6:84b6ee00 r5:84b33000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc1fb0 to 0xdffc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b527c0 INFO: task kworker/1:91:3519 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: c4127000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:92:3521 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:92 state:D stack:0 pid:3521 tgid:3521 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dffc9d84 r8:00000002 r7:60000013 r6:dffc9d8c r5:84b33c00 r4:84b33c00 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b33c00 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffc9e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84784080 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b33c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acff8c r4:84acfc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acff8c r4:84b6ff00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b33c00 r8:84b6ff2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6ff00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6ff00 r8:8027ed34 r7:dffb1e60 r6:84b6ee80 r5:84b33c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b52940 INFO: task kworker/1:92:3521 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: c4420000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:93:3523 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:93 state:D stack:0 pid:3523 tgid:3523 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dffd1d84 r8:00000002 r7:60000113 r6:dffd1d8c r5:84b34800 r4:84b34800 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b34800 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffd1e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b52c80 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b34800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84aceb8c r4:84ace800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84aceb8c r4:84b6fe80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b34800 r8:84b6feac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6fe80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6fe80 r8:8027ed34 r7:dffc9e60 r6:84b6ef00 r5:84b34800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd1fb0 to 0xdffd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b52a80 INFO: task kworker/1:93:3523 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: c4420000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:94:3525 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:94 state:D stack:0 pid:3525 tgid:3525 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dffd9d84 r8:00000002 r7:60000113 r6:dffd9d8c r5:84b35400 r4:84b35400 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b35400 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffd9e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b52dc0 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b35400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe6b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acef8c r4:84acec00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acef8c r4:84b6ff80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b35400 r8:84b6ffac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6ff80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6ff80 r8:8027ed34 r7:dffc9e60 r6:84b6ef80 r5:84b35400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd9fb0 to 0xdffd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b52a80 INFO: task kworker/1:94:3525 is blocked on a mutex likely owned by task kworker/1:75:3485. task:kworker/1:75 state:R running task stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d3000 r8:80200be4 r7:dff41d54 r6:ffffffff r5:848d3000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff41d20 to 0xdff41d68) 1d20: c45ba000 dfc6d000 00000001 80239bb8 7f0f1000 00000001 82abe1c4 82abd5a0 1d40: 7f0f1000 dfc6d000 8280c9b4 dff41d9c dff41da0 dff41d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff41dc0 r5:dff41e08 r4:dff41dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acaf8c r4:84acac00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acaf8c r4:84b6f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d3000 r8:84b6f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f600 r8:8027ed34 r7:dff35e60 r6:84b6e500 r5:848d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b733c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:95:3527 blocked for more than 453 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:95 state:D stack:0 pid:3527 tgid:3527 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dffe1d84 r8:00000002 r7:60000113 r6:dffe1d8c r5:848d6000 r4:848d6000 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848d6000 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffe1e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b52f00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d6000 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe77000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) <> ock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb001e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9fa40 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83b4c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb011000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85165f8c r4:85165c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85165f8c r4:85077c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b4c800 r8:85077cac r7:82804d40 r6:dddced40 r5:dddced60 r4:85077c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85077c80 r8:8027ed34 r7:eaff5e60 r6:85077d80 r5:83b4c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb001fb0 to 0xeb001ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9f880 INFO: task kworker/0:302:4544 is blocked on a mutex likely owned by task kworker/1:79:3493. task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff61d20 to 0xdff61d68) 1d20: ced5b000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08 r4:dff61dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb38c r4:84acb000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:303:4547 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:303 state:D stack:0 pid:4547 tgid:4547 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb009d84 r8:00000002 r7:60000113 r6:eb009d8c r5:83b4d400 r4:83b4d400 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83b4d400 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb009e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9fc40 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83b4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb01f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516638c r4:85166000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8516638c r4:85077d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b4d400 r8:85077d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85077d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85077d00 r8:8027ed34 r7:eb001e60 r6:85077e80 r5:83b4d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb009fb0 to 0xeb009ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9f980 INFO: task kworker/0:303:4547 is blocked on a mutex likely owned by task kworker/1:79:3493. task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff61d20 to 0xdff61d68) 1d20: cefcf000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08 r4:dff61dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb38c r4:84acb000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:304:4548 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:304 state:D stack:0 pid:4548 tgid:4548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb015d84 r8:00000002 r7:60000113 r6:eb015d8c r5:83b4e000 r4:83b4e000 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83b4e000 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb015e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719000 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83b4e000 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe51000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516678c r4:85166400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8516678c r4:85077e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b4e000 r8:85077e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85077e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85077e00 r8:8027ed34 r7:eb009e60 r6:84790000 r5:83b4e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb015fb0 to 0xeb015ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9f980 INFO: task kworker/0:304:4548 is blocked on a mutex likely owned by task kworker/1:79:3493. task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff61d20 to 0xdff61d68) 1d20: cf07f000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08 r4:dff61dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb38c r4:84acb000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:305:4550 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:305 state:D stack:0 pid:4550 tgid:4550 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb031d84 r8:00000002 r7:60000113 r6:eb031d8c r5:85140000 r4:85140000 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85140000 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb031e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a63f40 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85140000 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbd3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85245b8c r4:85245800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85245b8c r4:84790100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85140000 r8:8479012c r7:82804d40 r6:dddced40 r5:dddced60 r4:84790100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84790100 r8:8027ed34 r7:eb015e60 r6:84790080 r5:85140000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb031fb0 to 0xeb031ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9f980 INFO: task kworker/0:305:4550 is blocked on a mutex likely owned by task kworker/1:79:3493. task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff61d20 to 0xdff61d68) 1d20: cf476000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08 r4:dff61dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb38c r4:84acb000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:413:4553 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:413 state:D stack:0 pid:4553 tgid:4553 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb035d84 r8:00000002 r7:60000113 r6:eb035d8c r5:85141800 r4:85141800 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85141800 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb035e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a63ac0 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85141800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcc1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85245f8c r4:85245c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85245f8c r4:85117980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85141800 r8:851179ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85117980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85117980 r8:8027ed34 r7:eafbde60 r6:84790180 r5:85141800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb035fb0 to 0xeb035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a63f00 INFO: task kworker/1:413:4553 is blocked on a mutex likely owned by task kworker/1:79:3493. task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff61d20 to 0xdff61d68) 1d20: cf4ea000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08 r4:dff61dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb38c r4:84acb000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:306:4555 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:306 state:D stack:0 pid:4555 tgid:4555 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb03dd84 r8:00000002 r7:60000113 r6:eb03dd8c r5:85140c00 r4:85140c00 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85140c00 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb03de08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85255400 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85140c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf5d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b0b8c r4:852b0800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852b0b8c r4:84790200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85140c00 r8:8479022c r7:82804d40 r6:dddced40 r5:dddced60 r4:84790200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84790200 r8:8027ed34 r7:eb015e60 r6:84790280 r5:85140c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb03dfb0 to 0xeb03dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9fe00 INFO: task kworker/0:306:4555 is blocked on a mutex likely owned by task kworker/1:79:3493. task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff61d20 to 0xdff61d68) 1d20: cf860000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08 r4:dff61dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb38c r4:84acb000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:307:4558 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:307 state:D stack:0 pid:4558 tgid:4558 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb029d84 r8:00000002 r7:60000113 r6:eb029d8c r5:85143000 r4:85143000 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85143000 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb029e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719e80 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85143000 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac69000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85166b8c r4:85166800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85166b8c r4:84790300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85143000 r8:8479032c r7:82804d40 r6:dddced40 r5:dddced60 r4:84790300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84790300 r8:8027ed34 r7:eb03de60 r6:84790400 r5:85143000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb029fb0 to 0xeb029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719080 INFO: task kworker/0:307:4558 is blocked on a mutex likely owned by task kworker/1:79:3493. task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff61d20 to 0xdff61d68) 1d20: cfc3e000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08 r4:dff61dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb38c r4:84acb000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:414:4559 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:414 state:D stack:0 pid:4559 tgid:4559 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb041d84 r8:00000002 r7:60000113 r6:eb041d8c r5:85143c00 r4:85143c00 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85143c00 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb041e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a631c0 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85143c00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffad000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524678c r4:85246400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524678c r4:85117a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85143c00 r8:85117aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85117a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85117a80 r8:8027ed34 r7:eafbde60 r6:84790380 r5:85143c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb041fb0 to 0xeb041ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a63e80 INFO: task kworker/1:414:4559 is blocked on a mutex likely owned by task kworker/1:79:3493. task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff61d20 to 0xdff61d68) 1d20: cfc3e000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08 r4:dff61dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb38c r4:84acb000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:415:4562 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:415 state:D stack:0 pid:4562 tgid:4562 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb049d84 r8:00000002 r7:60000113 r6:eb049d8c r5:85145400 r4:85145400 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85145400 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb049e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b8f640 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85145400 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9f5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85247f8c r4:85247c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85247f8c r4:85117a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85145400 r8:85117a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85117a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85117a00 r8:8027ed34 r7:eb041e60 r6:84790480 r5:85145400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb049fb0 to 0xeb049ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a63400 INFO: task kworker/1:415:4562 is blocked on a mutex likely owned by task kworker/1:79:3493. task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff61d20 to 0xdff61d68) 1d20: cff10000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08 r4:dff61dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb38c r4:84acb000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:416:4564 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:416 state:D stack:0 pid:4564 tgid:4564 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb059d84 r8:00000002 r7:60000113 r6:eb059d8c r5:85146c00 r4:85146c00 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85146c00 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb059e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8511c500 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85146c00 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e046b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85246b8c r4:85246800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85246b8c r4:85117b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85146c00 r8:85117bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85117b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85117b80 r8:8027ed34 r7:eb049e60 r6:84790500 r5:85146c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb059fb0 to 0xeb059ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8511c400 INFO: task kworker/1:416:4564 is blocked on a mutex likely owned by task kworker/1:79:3493. task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff61d20 to 0xdff61d68) 1d20: d019c000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08 r4:dff61dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb38c r4:84acb000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:417:4565 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:417 state:D stack:0 pid:4565 tgid:4565 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb05dd84 r8:00000002 r7:60000113 r6:eb05dd8c r5:85144800 r4:85144800 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85144800 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb05de08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b8f140 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85144800 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04dd000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85246f8c r4:85246c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85246f8c r4:85117c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85144800 r8:85117c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85117c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85117c00 r8:8027ed34 r7:eb049e60 r6:84790580 r5:85144800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb05dfb0 to 0xeb05dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8511c400 INFO: task kworker/1:417:4565 is blocked on a mutex likely owned by task kworker/1:79:3493. task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff61d20 to 0xdff61d68) 1d20: d038b000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08 r4:dff61dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb38c r4:84acb000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:418:4568 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:418 state:D stack:0 pid:4568 tgid:4568 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb069d84 r8:00000002 r7:60000113 r6:eb069d8c r5:85146000 r4:85146000 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85146000 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb069e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b8f280 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85146000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e055f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524738c r4:85247000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524738c r4:85117b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85146000 r8:85117b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85117b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85117b00 r8:8027ed34 r7:eb049e60 r6:84790600 r5:85146000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb069fb0 to 0xeb069ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b8f080 INFO: task kworker/1:418:4568 is blocked on a mutex likely owned by task kworker/1:79:3493. task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff61d20 to 0xdff61d68) 1d20: d06be000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08 r4:dff61dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb38c r4:84acb000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:419:4570 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:419 state:D stack:0 pid:4570 tgid:4570 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb071d84 r8:00000002 r7:60000113 r6:eb071d8c r5:84810c00 r4:84810c00 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84810c00 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb071e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b8f400 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84810c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0663000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524778c r4:85247400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524778c r4:85117c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84810c00 r8:85117cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85117c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85117c80 r8:8027ed34 r7:eb049e60 r6:84790680 r5:84810c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb071fb0 to 0xeb071ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b8f1c0 INFO: task kworker/1:419:4570 is blocked on a mutex likely owned by task kworker/1:79:3493. task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff61d20 to 0xdff61d68) 1d20: d092b000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08 r4:dff61dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb38c r4:84acb000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:420:4571 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:420 state:D stack:0 pid:4571 tgid:4571 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb039d84 r8:00000002 r7:60000013 r6:eb039d8c r5:8525bc00 r4:8525bc00 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8525bc00 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb039e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b8f540 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8525bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e071b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85247b8c r4:85247800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85247b8c r4:85117d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8525bc00 r8:85117dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85117d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85117d80 r8:8027ed34 r7:eb049e60 r6:85117e00 r5:8525bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb039fb0 to 0xeb039ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b8f340 INFO: task kworker/1:420:4571 is blocked on a mutex likely owned by task kworker/1:79:3493. task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff61d20 to 0xdff61d68) 1d20: d0c67000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08 r4:dff61dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb38c r4:84acb000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:421:4574 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:421 state:D stack:0 pid:4574 tgid:4574 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb06dd84 r8:00000002 r7:60000113 r6:eb06dd8c r5:8525d400 r4:8525d400 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8525d400 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb06de08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b8f980 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8525d400 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabff000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8525038c r4:85250000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8525038c r4:85117d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8525d400 r8:85117d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85117d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85117d00 r8:8027ed34 r7:eb049e60 r6:85117f00 r5:8525d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb06dfb0 to 0xeb06dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b8f580 INFO: task kworker/1:421:4574 is blocked on a mutex likely owned by task kworker/1:79:3493. task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff61d20 to 0xdff61d68) 1d20: d0cd1000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08 r4:dff61dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb38c r4:84acb000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:422:4575 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:422 state:D stack:0 pid:4575 tgid:4575 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb01dd84 r8:00000002 r7:60000113 r6:eb01dd8c r5:8525e000 r4:8525e000 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8525e000 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb01de08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b8f840 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8525e000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa2f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8523b78c r4:8523b400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8523b78c r4:85117e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8525e000 r8:85117eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85117e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85117e80 r8:8027ed34 r7:eb06de60 r6:85117f80 r5:8525e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb01dfb0 to 0xeb01dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b8f580 INFO: task kworker/1:422:4575 is blocked on a mutex likely owned by task kworker/1:79:3493. task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff61d20 to 0xdff61d68) 1d20: d0f8d000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08 r4:dff61dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb38c r4:84acb000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:423:4578 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:423 state:D stack:0 pid:4578 tgid:4578 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb079d84 r8:00000002 r7:60000113 r6:eb079d8c r5:8525ec00 r4:8525ec00 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8525ec00 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb079e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b8fac0 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8525ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac0f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8525078c r4:85250400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8525078c r4:84b55100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8525ec00 r8:84b5512c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b55100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b55100 r8:8027ed34 r7:eb06de60 r6:84b55000 r5:8525ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb079fb0 to 0xeb079ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b8f8c0 INFO: task kworker/1:423:4578 is blocked on a mutex likely owned by task kworker/1:79:3493. task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff61d20 to 0xdff61d68) 1d20: d1255000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08 r4:dff61dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb38c r4:84acb000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:424:4580 blocked for more than 474 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:424 state:D stack:0 pid:4580 tgid:4580 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb081d84 r8:00000002 r7:60000113 r6:eb081d8c r5:8525c800 r4:8525c800 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8525c800 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb081e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b8fc40 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8525c800 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac2b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85250b8c r4:85250800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85250b8c r4:84b55080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8525c800 r8:84b550ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b55080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b55080 r8:8027ed34 r7:eb079e60 r6:84b55200 r5:8525c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb081fb0 to 0xeb081ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b8fa00 INFO: task kworker/1:424:4580 is blocked on a mutex likely owned by task kworker/1:79:3493. task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff61d20 to 0xdff61d68) 1d20: d1551000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08 r4:dff61dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb38c r4:84acb000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:425:4582 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:425 state:D stack:0 pid:4582 tgid:4582 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb085d84 r8:00000002 r7:60000113 r6:eb085d8c r5:8525b000 r4:8525b000 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8525b000 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb085e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b8fd80 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8525b000 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac3f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85250f8c r4:85250c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85250f8c r4:84b55180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8525b000 r8:84b551ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b55180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b55180 r8:8027ed34 r7:eb081e60 r6:84b55280 r5:8525b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb085fb0 to 0xeb085ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b8fb80 INFO: task kworker/1:425:4582 is blocked on a mutex likely owned by task kworker/1:79:3493. task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff61d20 to 0xdff61d68) 1d20: d1981000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08 r4:dff61dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb38c r4:84acb000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:426:4584 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:426 state:D stack:0 pid:4584 tgid:4584 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb089d84 r8:00000002 r7:60000013 r6:eb089d8c r5:85258000 r4:85258000 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85258000 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb089e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b8ff00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85258000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac55000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8525138c r4:85251000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8525138c r4:84b55300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85258000 r8:84b5532c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b55300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b55300 r8:8027ed34 r7:eb085e60 r6:84b55400 r5:85258000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb089fb0 to 0xeb089ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b8fcc0 INFO: task kworker/1:426:4584 is blocked on a mutex likely owned by task kworker/1:79:3493. task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff61d20 to 0xdff61d68) 1d20: d1b18000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08 r4:dff61dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb38c r4:84acb000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:427:4585 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:427 state:D stack:0 pid:4585 tgid:4585 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb07dd84 r8:00000002 r7:60000113 r6:eb07dd8c r5:85158000 r4:85158000 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85158000 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb07de08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a67440 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85158000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac99000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85251b8c r4:85251800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85251b8c r4:84b55380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85158000 r8:84b553ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b55380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b55380 r8:8027ed34 r7:eb089e60 r6:84b55480 r5:85158000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb07dfb0 to 0xeb07dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b8fe40 INFO: task kworker/1:427:4585 is blocked on a mutex likely owned by task kworker/1:79:3493. task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff61d20 to 0xdff61d68) 1d20: d1ddc000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08 r4:dff61dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb38c r4:84acb000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:308:4588 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:308 state:D stack:0 pid:4588 tgid:4588 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb09dd84 r8:00000002 r7:60000113 r6:eb09dd8c r5:8490ec00 r4:8490ec00 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8490ec00 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb09de08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85126280 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8490ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead25000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85166f8c r4:85166c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85166f8c r4:84790700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8490ec00 r8:8479072c r7:82804d40 r6:dddced40 r5:dddced60 r4:84790700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84790700 r8:8027ed34 r7:eb03de60 r6:84b55500 r5:8490ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb09dfb0 to 0xeb09dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84719f40 INFO: task kworker/0:308:4588 is blocked on a mutex likely owned by task kworker/1:79:3493. task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff61d20 to 0xdff61d68) 1d20: d2084000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08 r4:dff61dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84b73ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:428:4589 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:428 state:D stack:0 pid:4589 tgid:4589 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb0a1d84 r8:00000002 r7:60000013 r6:eb0a1d8c r5:85268000 r4:85268000 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85268000 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0a1e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a67380 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85268000 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 1d20: d2413000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00 r4:84b73ac0 INFO: task kworker/1:429:4592 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:429 state:D stack:0 pid:4592 tgid:4592 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb0a9d84 r8:00000002 r7:60000113 r6:eb0a9d8c r5:84813000 r4:84813000 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84813000 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0a9e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a675c0 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84813000 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85251f8c r4:85251c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85251f8c r4:84b55600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84813000 r8:84b5562c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b55600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b55600 r8:8027ed34 r7:eb07de60 r6:84790780 r5:84813000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0a9fb0 to 0xeb0a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a67340 INFO: task kworker/1:429:4592 is blocked on a mutex likely owned by task kworker/1:79:3493. task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff61d20 to 0xdff61d68) 1d20: d274f000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0 r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:430 state:D stack:0 pid:4593 tgid:4593 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0ade08 r4:00000000 r5:8525238c r4:85252000 r7:ddde2d40 r6:83018200 r5:8525238c r4:84b55680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84810000 r8:84b556ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b55680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b55680 r8:8027ed34 r7:eb0a9e60 r6:84790880 r5:84810000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0adfb0 to 0xeb0adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a67340 INFO: task kworker/1:430:4593 is blocked on a mutex likely owned by task kworker/1:79:3493. task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff61d20 to 0xdff61d68) 1d20: d2a93000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08 r4:dff61dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb38c r4:84acb000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:431:4595 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:431 state:D stack:0 pid:4595 tgid:4595 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb0b5d84 r8:00000002 r7:60000113 r6:eb0b5d8c r5:84812400 r4:84812400 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84812400 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0b5e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a67940 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84812400 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacf9000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85252b8c r4:85252800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85252b8c r4:84b55800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84812400 r8:84b5582c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b55800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b55800 r8:8027ed34 r7:eb0ade60 r6:84790900 r5:84812400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0b5fb0 to 0xeb0b5ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d60: 800d0013 ffffffff r4:00000000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:432 state:D stack:0 pid:4597 tgid:4597 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0bde08 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:eaceb000 r7:ddde2d40 r6:83018200 r5:8525278c r4:84b55780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84813c00 r8:84b557ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b55780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b55780 r8:8027ed34 r7:eb0b5e60 r6:84790980 r5:84813c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0bdfb0 to 0xeb0bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a677c0 INFO: task kworker/1:432:4597 is blocked on a mutex likely owned by task kworker/1:79:3493. task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff61d20 to 0xdff61d68) 1d20: d314d000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08 r4:dff61dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb38c r4:84acb000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:433 state:D stack:0 pid:4599 tgid:4599 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:84814800 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84814800 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0d5e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a67ec0 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84814800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae8b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85253b8c r4:85253800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85253b8c r4:84b55700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xeb0d5fb0 to 0xeb0d5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xdff61fb0 to 0xdff61ff8) r4:84b73ac0 task:kworker/1:434 state:D stack:0 pid:4601 tgid:4601 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0dde08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a67b00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84815400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead15000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85252f8c r4:85252c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85252f8c r4:84b55880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84815400 r8:84b558ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b55880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b55880 r8:8027ed34 r7:eb0d5e60 r6:84790a80 r5:84815400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0ddfb0 to 0xeb0ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a679c0 INFO: task kworker/1:434:4601 is blocked on a mutex likely owned by task kworker/1:79:3493. task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:00000000 r4:82abe1e4 r4:00000000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:829185c4 r9:eb0e5d84 r8:00000002 r7:60000113 r6:eb0e5d8c r5:84816000 r4:84816000 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84816000 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0e5e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a67c00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84816000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae4f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8525338c r4:85253000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8525338c r4:84b55980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84816000 r8:84b559ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b55980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b55980 r8:8027ed34 r7:eb0d5e60 r6:84790b00 r5:84816000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0e5fb0 to 0xeb0e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred 1d60: 800d0013 ffffffff r4:dff61dc0 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb38c r4:84acb000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:309:4605 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:309 state:D stack:0 pid:4605 tgid:4605 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:84816c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0e9e08 [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eaf1f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdff61d20 to 0xdff61d68) 1d20: d3cfb000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08 r4:dff61dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb38c r4:84acb000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb10dfb0 to 0xeb10dff8) r4:84a67b40 Call trace: 1d20: d3cfb000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08 r4:dff61dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb38c r4:84acb000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:437:4610 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:437 state:D stack:0 pid:4610 tgid:4610 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb111d84 r8:00000002 r7:60000113 r6:eb111d8c r5:84811800 r4:84811800 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84811800 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb111e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84b55a80 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d20: d4215000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 r4:00000000 r5:84acb38c r4:84acb000 r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:438:4612 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:438 state:D stack:0 pid:4612 tgid:4612 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb119d84 r8:00000002 r7:60000013 r6:eb119d8c r5:85148000 r4:85148000 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85148000 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb119e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85121040 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85148000 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaefb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d0b8c r4:852d0800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852d0b8c r4:84b55900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85148000 r8:84b5592c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b55900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b55900 r8:8027ed34 r7:eb111e60 r6:84790d80 r5:85148000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb119fb0 to 0xeb119ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a67f40 INFO: task kworker/1:438:4612 is blocked on a mutex likely owned by task kworker/1:79:3493. task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff61d20 to 0xdff61d68) 1d20: d43e8000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08 r4:dff61dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r5:00001000 r4:dfcaf000 r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb11de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84b55b80 r8:8027ed34 r7:eb119e60 r6:84790e00 r5:85148c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb11dfb0 to 0xeb11dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a67f40 INFO: task kworker/1:439:4613 is blocked on a mutex likely owned by task kworker/1:79:3493. task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff61d20 to 0xdff61d68) 1d20: d4545000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08 r4:dff61dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb38c r4:84acb000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:440:4615 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:440 state:D stack:0 pid:4615 tgid:4615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb125d84 r8:00000002 r7:60000013 r6:eb125d8c r5:8514a400 r4:8514a400 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8514a400 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb125e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a63a40 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8514a400 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaead000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d078c r4:852d0400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852d078c r4:84b55b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8514a400 r8:84b55b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b55b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b55b00 r8:8027ed34 r7:eb119e60 r6:84790e80 r5:8514a400 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 1d20: d46a0000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r5:00001000 r4:dfcaf000 r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 r4:00000001 Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 r4:84b73ac0 task:kworker/1:441 state:D stack:0 pid:4617 tgid:4617 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb12dd84 r8:00000002 r7:60000113 r6:eb12dd8c r5:85149800 r4:85149800 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85149800 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb12de08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85121540 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85149800 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0c3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d178c r4:852d1400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852d178c r4:84b55c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85149800 r8:84b55c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b55c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b55c00 r8:8027ed34 r7:eb119e60 r6:84790f00 r5:85149800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb12dfb0 to 0xeb12dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85121080 INFO: task kworker/1:441:4617 is blocked on a mutex likely owned by task kworker/1:79:3493. task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff61d20 to 0xdff61d68) 1d20: d499e000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r5:00001000 r4:dfcaf000 r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:442:4619 blocked for more than 475 seconds. r4:8514b000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb135e08 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:852d0f8c r4:852d0c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852d0f8c r4:84b55d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8514b000 r8:84b55dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b55d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b55d80 r8:8027ed34 r7:eb12de60 r6:84790f80 r5:8514b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb135fb0 to 0xeb135ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851211c0 INFO: task kworker/1:442:4619 is blocked on a mutex likely owned by task kworker/1:79:3493. task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff61d20 to 0xdff61d68) 1d20: d4c31000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08 r4:dff61dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb38c r4:84acb000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00 Exception stack(0xdff61fb0 to 0xdff61ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:8514bc00 [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb13de08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85121400 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8514bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb051000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d138c r4:852d1000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852d138c r4:84b55c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8514bc00 r8:84b55cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b55c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b55c80 r8:8027ed34 r7:eb12de60 r6:85077f80 r5:8514bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb13dfb0 to 0xeb13dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85121140 INFO: task kworker/1:443:4621 is blocked on a mutex likely owned by task kworker/1:79:3493. task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff61d20 to 0xdff61d68) 1d20: d4e9f000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r5:00001000 r4:dfcaf000 r5:84acb38c r4:84acb000 r4:84b6f800 Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:310:4624 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:310 state:D stack:0 pid:4624 tgid:4624 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb139d84 r8:00000002 r7:60000113 r6:eb139d8c r5:8514d400 r4:8514d400 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8514d400 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb139e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f9400 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8514d400 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47c3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85167b8c r4:85167800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85167b8c r4:850fb100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8514d400 r8:850fb12c r7:82804d40 r6:dddced40 r5:dddced60 r4:850fb100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fb100 r8:8027ed34 r7:eb03de60 r6:850fb080 r5:8514d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb139fb0 to 0xeb139ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85126e80 INFO: task kworker/0:310:4624 is blocked on a mutex likely owned by task kworker/1:79:3493. task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:444:4626 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:444 state:D stack:0 pid:4626 tgid:4626 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb145d84 r8:00000002 r7:60000113 r6:eb145d8c r5:8514e000 r4:8514e000 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8514e000 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb145e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85121600 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8514e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cf000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0ed000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d1b8c r4:852d1800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84b55d00 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 1d20: d5301000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 r4:82abe1e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r5:00001000 r4:dfcaf000 r5:84acb38c r4:84acb000 r4:84b6f800 Exception stack(0xdff61fb0 to 0xdff61ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:445:4627 blocked for more than 475 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:445 state:D stack:0 pid:4627 tgid:4627 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb149d84 r8:00000002 r7:60000013 r6:eb149d8c r5:8514ec00 r4:8514ec00 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8514ec00 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb149e08 r4:00000000 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84b55f00 r8:8027ed34 r7:eb145e60 r6:850fb180 r5:8514ec00 task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:dfcaf000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xdff61fb0 to 0xdff61ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:446 state:D stack:0 pid:4629 tgid:4629 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb155d84 r8:00000002 r7:60000113 r6:eb155d8c r5:8514c800 r4:8514c800 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8514c800 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb155e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851218c0 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8514c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0d5000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb151000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d238c r4:852d2000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852d238c r4:84b55e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8514c800 r8:84b55eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b55e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b55e80 r8:8027ed34 r7:eb149e60 r6:850fb200 r5:8514c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb155fb0 to 0xeb155ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85121640 INFO: task kworker/1:446:4629 is blocked on a mutex likely owned by task kworker/1:79:3493. task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff61d20 to 0xdff61d68) 1d20: d54af000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08 r4:dff61dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcaf000 r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 r4:84b73ac0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:447 state:D stack:0 pid:4632 tgid:4632 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb15dd84 r8:00000002 r7:60000113 r6:eb15dd8c r5:85142400 r4:85142400 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85142400 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb15de08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85121a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85142400 r7:00000000 r6:83018200 r5:00001000 r4:7f011000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9f1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d278c r4:852d2400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852d278c r4:84b55f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85142400 r8:84b55fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b55f80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 800d0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r5:84acb38c r4:84acb000 r4:84b6f800 Exception stack(0xdff61fb0 to 0xdff61ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:448 state:D stack:0 pid:4633 tgid:4633 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb161e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85121b40 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85150000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d2b8c r4:852d2800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852d2b8c r4:8506d100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85150000 r8:8506d12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8506d100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506d100 r8:8027ed34 r7:eb15de60 r6:850fb300 r5:85150000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb161fb0 to 0xeb161ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851216c0 INFO: task kworker/1:448:4633 is blocked on a mutex likely owned by task kworker/1:79:3493. task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff61d20 to 0xdff61d68) 1d20: d71b0000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08 r4:dff61dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb38c r4:84acb000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:449 state:D stack:0 pid:4635 tgid:4635 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb165e08 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85121cc0 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85150c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b2000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d2f8c r4:852d2c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852d2f8c r4:8506d000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85150c00 r8:8506d02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8506d000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506d000 r8:8027ed34 r7:eb161e60 r6:850fb380 r5:85150c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb165fb0 to 0xeb165ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85121a80 INFO: task kworker/1:449:4635 is blocked on a mutex likely owned by task kworker/1:79:3493. task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff61d20 to 0xdff61d68) 1d20: d7704000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r5:84acb38c r4:84acb000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xdff61fb0 to 0xdff61ff8) r4:84b73ac0 Workqueue: events bpf_prog_free_deferred [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85121dc0 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0419000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d338c r4:852d3000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852d338c r4:8506d180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85152400 r8:8506d1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8506d180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506d180 r8:8027ed34 r7:eb165e60 r6:850fb400 r5:85152400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb169fb0 to 0xeb169ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851219c0 INFO: task kworker/1:450:4639 is blocked on a mutex likely owned by task kworker/1:79:3493. task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff61d20 to 0xdff61d68) 1d20: d79b0000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08 r4:00000000 r5:00001000 r4:dfcaf000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xdff61fb0 to 0xdff61ff8) r4:84b73ac0 Workqueue: events bpf_prog_free_deferred [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85121d00 INFO: task kworker/1:451:4641 is blocked on a mutex likely owned by task kworker/1:79:3493. task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff61d20 to 0xdff61d68) 1d20: d7be0000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08 r4:dff61dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb38c r4:84acb000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r4:85151800 [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84719cc0 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d3b8c r4:852d3800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852d3b8c r4:8506d280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85151800 r8:8506d2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8506d280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506d280 r8:8027ed34 r7:eb171e60 r6:850fb480 r5:85151800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb175fb0 to 0xeb175ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85121e80 INFO: task kworker/1:452:4642 is blocked on a mutex likely owned by task kworker/1:79:3493. task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff61d20 to 0xdff61d68) 1d20: d7e82000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08 r4:dff61dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 r4:00000001 Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:311:4645 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:311 state:D stack:0 pid:4645 tgid:4645 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb095d84 r8:00000002 r7:60000113 r6:eb095d8c r5:85154800 r4:85154800 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85154800 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb095e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f9e40 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85154800 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea96f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847d3b8c r4:847d3800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:847d3b8c r4:850fb580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85154800 r8:850fb5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:850fb580 r10:00000000 r9:850fb580 r8:8027ed34 r7:eb03de60 r6:850fb680 r5:85154800 r4:850f9340 Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff61d20 to 0xdff61d68) 1d20: d8087000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08 r4:dff61dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:453:4647 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:453 state:D stack:0 pid:4647 tgid:4647 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb179d84 r8:00000002 r7:60000113 r6:eb179d8c r5:85155400 r4:85155400 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85155400 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:e881d000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) 1d60: 800d0013 ffffffff r4:dff61dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r5:00001000 r4:dfcaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb38c r4:84acb000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:454:4649 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:454 state:D stack:0 pid:4649 tgid:4649 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb185d84 r8:00000002 r7:60000113 r6:eb185d8c r5:85153000 r4:85153000 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85153000 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb185e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c080 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85153000 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea891000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d3f8c r4:852d3c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852d3f8c r4:8506d080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85153000 r8:8506d0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:454:4649 is blocked on a mutex likely owned by task kworker/1:79:3493. Exception stack(0xdff61d20 to 0xdff61d68) 1d60: 800d0013 ffffffff r4:dff61dc0 r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb38c r4:84acb000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:455:4651 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:455 state:D stack:0 pid:4651 tgid:4651 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb189d84 r8:00000002 r7:60000113 r6:eb189d8c r5:85156000 r4:85156000 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85156000 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb189e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c280 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85156000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8c5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d438c r4:852d4000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852d438c r4:8506d380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85156000 r8:8506d3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8506d380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506d380 r8:8027ed34 r7:eb185e60 r6:850fb700 r5:85156000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb189fb0 to 0xeb189ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8506c040 INFO: task kworker/1:455:4651 is blocked on a mutex likely owned by task kworker/1:79:3493. task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff61d20 to 0xdff61d68) 1d20: d8ac5000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08 r4:dff61dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r4:00000000 r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:84950000 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84950000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8f7000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d478c r4:852d4400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852d478c r4:8506d400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84950000 r8:8506d42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8506d400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506d400 r8:8027ed34 r7:eb189e60 r6:850fb800 r5:84950000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb18dfb0 to 0xeb18dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8506c040 INFO: task kworker/1:456:4652 is blocked on a mutex likely owned by task kworker/1:79:3493. task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff61d20 to 0xdff61d68) 1d20: d9245000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 r4:82abe1e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xdff61fb0 to 0xdff61ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:457:4655 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:457 state:D stack:0 pid:4655 tgid:4655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb195d84 r8:00000002 r7:60000013 r6:eb195d8c r5:84951800 r4:84951800 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84951800 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb195e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c840 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84951800 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa77000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d538c r4:852d5000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852d538c r4:8506d580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84951800 r8:8506d5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8506d580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506d580 r8:8027ed34 r7:eb18de60 r6:850fb880 r5:84951800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb195fb0 to 0xeb195ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8506c300 INFO: task kworker/1:457:4655 is blocked on a mutex likely owned by task kworker/1:79:3493. task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff61d20 to 0xdff61d68) 1d20: d9245000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0 r4:dff61dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb38c r4:84acb000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:458:4656 blocked for more than 476 seconds. Call trace: [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c580 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdff61d20 to 0xdff61d68) 1d20: d9245000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08 r4:dff61dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb38c r4:84acb000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:312:4659 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:312 state:D stack:0 pid:4659 tgid:4659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb181d84 r8:00000002 r7:60000113 r6:eb181d8c r5:84953000 r4:84953000 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84953000 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb181e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85255c80 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84953000 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadd9000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b078c r4:852b0400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852b078c r4:850fb980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84953000 r8:850fb9ac r7:82804d40 r6:dddced40 r5:dddced60 r4:850fb980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fb980 r8:8027ed34 r7:eb03de60 r6:850fba80 r5:84953000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb181fb0 to 0xeb181ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850f9d80 INFO: task kworker/0:312:4659 is blocked on a mutex likely owned by task kworker/1:79:3493. task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00 r4:00000000 1d20: da197000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08 r4:dff61dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb38c r4:84acb000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:459:4660 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 Call trace: [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb19de08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c740 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84953c00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa59000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d4f8c r4:852d4c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852d4f8c r4:8506d500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84953c00 r8:8506d52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8506d500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506d500 r8:8027ed34 r7:eb195e60 r6:850fba00 r5:84953c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb19dfb0 to 0xeb19dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8506c300 INFO: task kworker/1:459:4660 is blocked on a mutex likely owned by task kworker/1:79:3493. task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff61d20 to 0xdff61d68) 1d20: da197000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08 r4:dff61dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb38c r4:84acb000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:460:4663 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:460 state:D stack:0 pid:4663 tgid:4663 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb1a1d84 r8:00000002 r7:60000013 r6:eb1a1d8c r5:84954800 r4:84954800 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84954800 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1a1e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506ca80 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84954800 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaafb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d5b8c r4:852d5800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8506d680 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8506c780 INFO: task kworker/1:460:4663 is blocked on a mutex likely owned by task kworker/1:79:3493. task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff61d20 to 0xdff61d68) 1d20: da7b7000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08 r4:dff61dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb38c r4:84acb000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:461:4665 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:461 state:D stack:0 pid:4665 tgid:4665 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb1a9d84 r8:00000002 r7:60000013 r6:eb1a9d8c r5:84956000 r4:84956000 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84956000 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1a9e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c980 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84956000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa8f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d578c r4:852d5400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852d578c r4:8506d600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84956000 r8:8506d62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8506d600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506d600 r8:8027ed34 r7:eb1a1e60 r6:850fbb80 r5:84956000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1a9fb0 to 0xeb1a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8506c8c0 INFO: task kworker/1:461:4665 is blocked on a mutex likely owned by task kworker/1:79:3493. task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff61d20 to 0xdff61d68) 1d20: dab2a000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08 r4:dff61dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 r5:84acb38c r4:84acb000 r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r5:84955400 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1b1e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852559c0 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead81000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b038c r4:852b0000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852b038c r4:8506d700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84955400 r8:8506d72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8506d700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506d700 r8:8027ed34 r7:eb1a1e60 r6:850fbc00 r5:84955400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1b1fb0 to 0xeb1b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8506c9c0 INFO: task kworker/1:462:4667 is blocked on a mutex likely owned by task kworker/1:79:3493. task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff61d20 to 0xdff61d68) 1d20: daf08000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08 r4:dff61dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb38c r4:84acb000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:463:4668 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:463 state:D stack:0 pid:4668 tgid:4668 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb1b5d84 r8:00000002 r7:60000113 r6:eb1b5d8c r5:84950c00 r4:84950c00 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84950c00 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1b5e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506cc00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84950c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab1f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d5f8c r4:852d5c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852d5f8c r4:8506d780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84950c00 r8:8506d7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8506d780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506d780 r8:8027ed34 r7:eb1b1e60 r6:850fbc80 r5:84950c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1b5fb0 to 0xeb1b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8506c9c0 INFO: task kworker/1:463:4668 is blocked on a mutex likely owned by task kworker/1:79:3493. task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff61d20 to 0xdff61d68) 1d20: db2d5000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08 r4:dff61dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcaf000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84b6f800 Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:464:4670 blocked for more than 476 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:464 state:D stack:0 pid:4670 tgid:4670 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb1bdd84 r8:00000002 r7:60000113 r6:eb1bdd8c r5:85308c00 r4:85308c00 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85308c00 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1bde08 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506cd40 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85308c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab43000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d638c r4:852d6000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852d638c r4:8506d880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85308c00 r8:8506d8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8506d880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506d880 r8:8027ed34 r7:eb1b1e60 r6:850fbd00 r5:85308c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1bdfb0 to 0xeb1bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8506cb40 task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 800d0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r5:00001000 r4:dfcaf000 r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:465 state:D stack:0 pid:4672 tgid:4672 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85308000 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1c5e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506ce40 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85308000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab61000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d678c r4:852d6400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852d678c r4:8506d900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85308000 r8:8506d92c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8506d900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506d900 r8:8027ed34 r7:eb1b1e60 r6:850fbd80 r5:85308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1c5fb0 to 0xeb1c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8506ce80 INFO: task kworker/1:465:4672 is blocked on a mutex likely owned by task kworker/1:79:3493. task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff61d20 to 0xdff61d68) 1d20: dbaef000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:dff61dc0 r4:00000000 r5:00001000 r4:dfcaf000 r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:466:4675 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:466 state:D stack:0 pid:4675 tgid:4675 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb1d1d84 r8:00000002 r7:60000013 r6:eb1d1d8c r5:85309800 r4:85309800 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85309800 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1d1e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506cfc0 r5:00001000 r4:eab8d000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: 1d20: dbe67000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 r4:dff61dc0 r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb38c r4:84acb000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:467:4676 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:467 state:D stack:0 pid:4676 tgid:4676 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb1d5d84 r8:00000002 r7:60000113 r6:eb1d5d8c r5:8530bc00 r4:8530bc00 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8530bc00 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1d5e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f9680 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8530bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r5:00001000 r4:ead4f000 r10:61c88647 r9:8530bc00 r8:8506da2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850f9800 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff61d20 to 0xdff61d68) 1d20: dbe67000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08 r4:dff61dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb38c r4:84acb000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00 Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:468:4678 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:468 state:D stack:0 pid:4678 tgid:4678 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:dff61dc0 r5:00001000 r4:dfcaf000 r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:ddde2d40 r6:83018200 r5:852d7f8c r4:8506db00 INFO: task kworker/1:469:4681 is blocked on a mutex likely owned by task kworker/1:79:3493. [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08 r4:dff61dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb38c r4:84acb000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1e5e08 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:853050c0 [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:313:4685 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:313 state:D stack:0 pid:4685 tgid:4685 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb191d84 r8:00000002 r7:60000113 r6:eb191d8c r5:8530ec00 r4:8530ec00 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8530ec00 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb191e08 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 1fa0: 00000000 00000000 00000000 00000000 1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0 r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 Exception stack(0xdff61fb0 to 0xdff61ff8) Workqueue: events bpf_prog_free_deferred r4:00000000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 9fa0: 00000000 00000000 00000000 00000000 r4:00000000 r4:82abe1e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb38c r4:84acb000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:472:4689 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:472 state:D stack:0 pid:4689 tgid:4689 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb1f5d84 r8:00000002 r7:60000013 r6:eb1f5d8c r5:84470000 r4:84470000 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84470000 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1f5e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85305600 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84470000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf6b000 r7:ddde2d40 r6:83018200 r5:852d838c r4:8506dc80 r4:85305340 INFO: task kworker/1:472:4689 is blocked on a mutex likely owned by task kworker/1:79:3493. task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff61d20 to 0xdff61d68) 1d20: dd846000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08 r4:dff61dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb38c r4:84acb000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xdff61fb0 to 0xdff61ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:473:4690 blocked for more than 477 seconds. r5:84470c00 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1f9e08 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:852d9b8c r4:8506dd00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff61d20 to 0xdff61d68) 1d20: ddd1a000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08 r4:dff61dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb38c r4:84acb000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00 Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 r4:84b73ac0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85346cc0 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85340380 r8:8027ed34 r7:eb191e60 r6:85340480 r5:84473000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85255280 INFO: task kworker/0:314:4693 is blocked on a mutex likely owned by task kworker/1:79:3493. task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff61d20 to 0xdff61d68) 1d20: de07f000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08 r4:dff61dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84acb38c r4:84acb000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xdff61fb0 to 0xdff61ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r5:00001000 r4:eaf75000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d878c r4:852d8400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852d878c r4:8506db80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84473c00 r8:8506dbac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8506db80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506db80 r8:8027ed34 r7:eb1f9e60 r6:85340400 r5:84473c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb205fb0 to 0xeb205ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85305540 INFO: task kworker/1:474:4694 is blocked on a mutex likely owned by task kworker/1:79:3493. task:kworker/1:79 state:R running task stack:0 pid:3493 tgid:3493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:849e0c00 r8:80200be4 r7:dff61d54 r6:ffffffff r5:849e0c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 1d20: de532000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 Exception stack(0xdff61fb0 to 0xdff61ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:84472400 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:00000000 r9:8506de00 r8:8027ed34 r7:eb1f9e60 r6:85340500 r5:84472400 Workqueue: events bpf_prog_free_deferred [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08 r4:dff61dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb38c r4:84acb000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:476:4698 blocked for more than 477 seconds. r4:84471800 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:852d8f8c r4:8506de80 r4:853057c0 r4:00000000 r4:82abe1e4 r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:477 state:D stack:0 pid:4700 tgid:4700 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb061d84 r8:00000002 r7:60000113 r6:eb061d8c r5:84474800 r4:84474800 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84474800 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb061e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85305900 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84474800 r7:00000000 r6:83018200 r5:00001000 r4:7f00f000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa07000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d938c r4:852d9000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852d938c r4:8506dd80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84474800 r8:8506ddac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8506dd80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506dd80 r8:8027ed34 r7:eb1f9e60 r6:85340600 r5:84474800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb061fb0 to 0xeb061ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85305900 INFO: task kworker/1:477:4700 is blocked on a mutex likely owned by task kworker/1:79:3493. 1d60: 800d0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xdff61fb0 to 0xdff61ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:84475400 r4:829185c0 [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85305c40 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84475400 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc87000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d978c r4:852d9400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852d978c r4:8506df00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84475400 r8:8506df2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8506df00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506df00 r8:8027ed34 r7:eb1f9e60 r6:85340680 r5:84475400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb221fb0 to 0xeb221ff8) 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82abe1e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r9:83018205 r8:849e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcaf000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb38c r4:84acb000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb38c r4:84b6f800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0c00 r8:84b6f82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f800 r8:8027ed34 r7:dff59e60 r6:84b6e700 r5:849e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff61fb0 to 0xdff61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73ac0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:479:4704 blocked for more than 477 seconds. Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb229e08 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84476000 r8:8506dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85305c00 r4:00000000 Exception stack(0xdff61d20 to 0xdff61d68) 1d20: df996000 dfc7d000 00000001 80239bb8 7f0f3000 00000001 82abe1c4 82abd5a0 1d40: 7f0f3000 dfc7d000 8280c9b4 dff61d9c dff61da0 dff61d70 80230af4 80239bd0 1d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff61dc0 r5:dff61e08 r4:dff61dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73b00 r4:00000000 [] (0xdff61e74) from [] (0xdff61ea4) Backtrace aborted due to bad frame pointer <847b5380> Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:480:4706 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:480 state:D stack:0 pid:4706 tgid:4706 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb231d84 r8:00000002 r7:60000113 r6:eb231d8c r5:84476c00 r4:84476c00 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84476c00 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb231e08 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85349100 r8:8027ed34 r7:eb229e60 r6:85340780 r5:84476c00 r4:85305a80 Call trace: 9d20: 7f8be000 dfc9d000 00000001 80239bb8 7f0f5000 00000001 82abe1c4 82abd5a0 r4:00000000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:848d6c00 r8:84b6f7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:481:4708 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:481 state:D stack:0 pid:4708 tgid:4708 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb239d84 r8:00000002 r7:60000013 r6:eb239d8c r5:85320000 r4:85320000 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85320000 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb239e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853050c0 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85320000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0493000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852da38c r4:852da000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852da38c r4:85349000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85320000 r8:8534902c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85349000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85349000 r8:8027ed34 r7:eb229e60 r6:85340800 r5:85320000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb239fb0 to 0xeb239ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85305e00 INFO: task kworker/1:481:4708 is blocked on a mutex likely owned by task kworker/1:78:3491. task:kworker/1:78 state:R running task stack:0 pid:3491 tgid:3491 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d6c00 r8:80200be4 r7:dff59d54 r6:ffffffff r5:848d6c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff59d20 to 0xdff59d68) 9d20: 7f8be000 dfc9d000 00000001 80239bb8 7f0f5000 00000001 82abe1c4 82abd5a0 9d40: 7f0f5000 dfc9d000 8280c9b4 dff59d9c dff59da0 dff59d70 80230af4 80239bd0 9d60: 900d0013 ffffffff r5:900d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73c80 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r4:84b73900 task:kworker/1:482 state:D stack:0 pid:4710 tgid:4710 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb241e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85255d80 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85321800 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0535000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852da78c r4:852da400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852da78c r4:85349180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85321800 r8:853491ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85349180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85349180 r8:8027ed34 r7:eb229e60 r6:85340880 r5:85321800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb241fb0 to 0xeb241ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73c80 r9:83018205 r8:848d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfccb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb78c r4:84acb400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb78c r4:84b6f780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d6c00 r8:84b6f7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f780 r8:8027ed34 r7:dff41e60 r6:84b6e680 r5:848d6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff59fb0 to 0xdff59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb1d9fb0 to 0xeb1d9ff8) task:kworker/1:78 state:R running task stack:0 pid:3491 tgid:3491 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73c80 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfccb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb78c r4:84acb400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb78c r4:84b6f780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d6c00 r8:84b6f7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f780 r8:8027ed34 r7:dff41e60 r6:84b6e680 r5:848d6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff59fb0 to 0xdff59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:315:4716 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:315 state:D stack:0 pid:4716 tgid:4716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb23dd84 r8:00000002 r7:60000113 r6:eb23dd8c r5:85323000 r4:85323000 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85323000 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb23de08 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b178c r4:852b1400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852b178c r4:85340a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85323000 r8:85340a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85340a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85340a00 r8:8027ed34 r7:eb191e60 r6:85340980 r5:85323000 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdff59d20 to 0xdff59d68) r4:dff59dc0 r4:00000000 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb245e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84786040 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85324800 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead21000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b1b8c r4:852b1800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852b1b8c r4:85340a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85324800 r8:85340aac r7:82804d40 r6:dddced40 r5:dddced60 r4:85340a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85340a80 r8:8027ed34 r7:eb191e60 r6:85340b00 r5:85324800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdff59d20 to 0xdff59d68) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73c80 r4:84b6f780 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff59fb0 to 0xdff59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:484:4719 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:484 state:D stack:0 pid:4719 tgid:4719 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb249d84 r8:00000002 r7:60000113 r6:eb249d8c r5:85325400 r4:85325400 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85325400 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb249e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 r5:852daf8c r4:852dac00 r4:85349280 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:78 state:R running task stack:0 pid:3491 tgid:3491 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84acb78c r4:84acb400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb78c r4:84b6f780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d6c00 r8:84b6f7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f780 r8:8027ed34 r7:dff41e60 r6:84b6e680 r5:848d6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff59fb0 to 0xdff59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:485:4722 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:485 state:D stack:0 pid:4722 tgid:4722 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb255d84 r8:00000002 r7:60000013 r6:eb255d8c r5:85326000 r4:85326000 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85326000 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb255e08 r4:00000000 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:852db78c r4:852db400 r10:61c88647 r9:85326000 r8:8534932c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdff59d20 to 0xdff59d68) 9d20: 80b6f000 dfc9d000 00000001 80239bb8 7f0f5000 00000001 82abe1c4 82abd5a0 9d40: 7f0f5000 dfc9d000 8280c9b4 dff59d9c dff59da0 dff59d70 80230af4 80239bd0 9d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff59dc0 r5:dff59e08 r4:dff59dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73c80 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfccb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb78c r4:84acb400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb78c r4:84b6f780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d6c00 r8:84b6f7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f780 r8:8027ed34 r7:dff41e60 r6:84b6e680 r5:848d6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff59fb0 to 0xdff59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:486:4724 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:829185c4 r9:eb099d84 r8:00000002 r7:60000113 r6:eb099d8c r5:8526bc00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb099e08 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:eacc3000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xeb099fb0 to 0xeb099ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:848d6c00 r8:80200be4 r7:dff59d54 r6:ffffffff r5:848d6c00 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff59dc0 r5:dff59e08 r4:dff59dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73c80 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfccb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb78c r4:84acb400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb78c r4:84b6f780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d6c00 r8:84b6f7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f780 r8:8027ed34 r7:dff41e60 r6:84b6e680 r5:848d6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff59fb0 to 0xdff59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:487:4725 blocked for more than 477 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:487 state:D stack:0 pid:4725 tgid:4725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb24dd84 r8:00000002 r7:60000013 r6:eb24dd8c r5:8526ec00 r4:8526ec00 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8526ec00 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb24de08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85352680 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8526ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852dbb8c r4:852db800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852dbb8c r4:85349380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8526ec00 r8:853493ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85349380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85349380 r8:8027ed34 r7:eb099e60 r6:85349480 r5:8526ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb24dfb0 to 0xeb24dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85352480 INFO: task kworker/1:487:4725 is blocked on a mutex likely owned by task kworker/1:78:3491. task:kworker/1:78 state:R running task stack:0 pid:3491 tgid:3491 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d6c00 r8:80200be4 r7:dff59d54 r6:ffffffff r5:848d6c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff59d20 to 0xdff59d68) 9d20: 80f67000 dfc9d000 00000001 80239bb8 7f0f5000 00000001 82abe1c4 82abd5a0 9d40: 7f0f5000 dfc9d000 8280c9b4 dff59d9c dff59da0 dff59d70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff59dc0 r5:dff59e08 [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xdff59fb0 to 0xdff59ff8) r4:84b73900 Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:488 state:D stack:0 pid:4728 tgid:4728 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb259d84 r8:00000002 r7:60000113 r6:eb259d8c r5:8526e000 r4:8526e000 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8526e000 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb259e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85352a00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8526e000 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacd3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852dc38c r4:852dc000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852dc38c r4:85349500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8526e000 r8:8534952c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85349500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85349500 r8:8027ed34 r7:eb099e60 r6:85349600 r5:8526e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb259fb0 to 0xeb259ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853525c0 INFO: task kworker/1:488:4728 is blocked on a mutex likely owned by task kworker/1:78:3491. task:kworker/1:78 state:R running task stack:0 pid:3491 tgid:3491 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d6c00 r8:80200be4 r7:dff59d54 r6:ffffffff r5:848d6c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff59d20 to 0xdff59d68) 9d20: 8167e000 dfc9d000 00000001 80239bb8 7f0f5000 00000001 82abe1c4 82abd5a0 9d40: 7f0f5000 dfc9d000 8280c9b4 dff59d9c dff59da0 dff59d70 80230af4 80239bd0 9d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff59dc0 r5:dff59e08 r4:dff59dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73c80 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfccb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb78c r4:84acb400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb78c r4:84b6f780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d6c00 r8:84b6f7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f780 r8:8027ed34 r7:dff41e60 r6:84b6e680 r5:848d6c00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:8526d400 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb261e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85352ac0 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8526d400 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacff000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852dc78c r4:852dc400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852dc78c r4:85349680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8526d400 r8:853496ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85349680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85349680 r8:8027ed34 r7:eb259e60 r6:85349700 r5:8526d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fa0: 00000000 00000000 00000000 00000000 r4:85352940 Workqueue: events bpf_prog_free_deferred r4:00000000 9d40: 7f0f5000 dfc9d000 8280c9b4 dff59d9c dff59da0 dff59d70 80230af4 80239bd0 r4:dff59dc0 r4:00000000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:84acb78c r4:84b6f780 r10:00000000 r9:84b6f780 r8:8027ed34 r7:dff41e60 r6:84b6e680 r5:848d6c00 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:490:4732 blocked for more than 478 seconds. task:kworker/1:490 state:D stack:0 pid:4732 tgid:4732 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85268c00 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb25de08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853565c0 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85268c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb003000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852dd38c r4:852dd000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852dd38c r4:85349580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85268c00 r8:853495ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85349580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85349580 r8:8027ed34 r7:eb261e60 r6:85349780 r5:85268c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb25dfb0 to 0xeb25dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85352a40 INFO: task kworker/1:490:4732 is blocked on a mutex likely owned by task kworker/1:78:3491. task:kworker/1:78 state:R running task stack:0 pid:3491 tgid:3491 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d6c00 r8:80200be4 r7:dff59d54 r6:ffffffff r5:848d6c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff59d20 to 0xdff59d68) 9d20: 81b23000 dfc9d000 00000001 80239bb8 7f0f5000 00000001 82abe1c4 82abd5a0 9d40: 7f0f5000 dfc9d000 8280c9b4 dff59d9c dff59da0 dff59d70 80230af4 80239bd0 9d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff59dc0 r5:dff59e08 r4:dff59dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73c80 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfccb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb78c r4:84acb400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb78c r4:84b6f780 r4:84b6f780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f780 r8:8027ed34 r7:dff41e60 r6:84b6e680 r5:848d6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff59fb0 to 0xdff59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:317:4735 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:317 state:D stack:0 pid:4735 tgid:4735 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb271d84 r8:00000002 r7:60000113 r6:eb271d8c r5:8526b000 r4:8526b000 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8526b000 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb271e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84786440 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8526b000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaea5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847d078c r4:847d0400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:847d078c r4:85340c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8526b000 r8:85340cac r7:82804d40 r6:dddced40 r5:dddced60 r4:85340c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85340c80 r8:8027ed34 r7:eb191e60 r6:85349800 r5:8526b000 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:78 state:R running task stack:0 pid:3491 tgid:3491 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff59d20 to 0xdff59d68) 9d20: 81f34000 dfc9d000 00000001 80239bb8 7f0f5000 00000001 82abe1c4 82abd5a0 9d40: 7f0f5000 dfc9d000 8280c9b4 dff59d9c dff59da0 dff59d70 80230af4 80239bd0 9d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff59dc0 r5:dff59e08 r4:dff59dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73c80 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfccb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb78c r4:84acb400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb78c r4:84b6f780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d6c00 r8:84b6f7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f780 r8:8027ed34 r7:dff41e60 r6:84b6e680 r5:848d6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff59fb0 to 0xdff59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:318:4736 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:318 state:D stack:0 pid:4736 tgid:4736 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb275d84 r8:00000002 r7:60000113 r6:eb275d8c r5:8526a400 r4:8526a400 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8526a400 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb275e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535c140 r5:00001000 r4:eae85000 r7:dddced40 r6:83018000 r5:852dcb8c r4:85340d00 r10:00000000 r9:85340d00 r8:8027ed34 r7:eb271e60 r6:85349880 r5:8526a400 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 9d40: 7f0f5000 dfc9d000 8280c9b4 dff59d9c dff59da0 dff59d70 80230af4 80239bd0 9d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff59dc0 r5:dff59e08 r4:dff59dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73c80 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfccb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb78c r4:84acb400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb78c r4:84b6f780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d6c00 r8:84b6f7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f780 r8:8027ed34 r7:dff41e60 r6:84b6e680 r5:848d6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff59fb0 to 0xdff59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:319:4737 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:319 state:D stack:0 pid:4737 tgid:4737 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb27dd84 r8:00000002 r7:60000113 r6:eb27dd8c r5:85156c00 r4:85156c00 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85156c00 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb27de08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535c300 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85156c00 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b238c r4:852b2000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852b238c r4:85340d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85156c00 r8:85340dac r7:82804d40 r6:dddced40 r5:dddced60 r4:85340d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85340d80 r8:8027ed34 r7:eb271e60 r6:85349a00 r5:85156c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb27dfb0 to 0xeb27dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8535c080 INFO: task kworker/0:319:4737 is blocked on a mutex likely owned by task kworker/1:78:3491. task:kworker/1:78 state:R running task stack:0 pid:3491 tgid:3491 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d6c00 r8:80200be4 r7:dff59d54 r6:ffffffff r5:848d6c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff59d20 to 0xdff59d68) 9d20: 82834000 dfc9d000 00000001 80239bb8 7f0f5000 00000001 82abe1c4 82abd5a0 9d40: 7f0f5000 dfc9d000 8280c9b4 dff59d9c dff59da0 dff59d70 80230af4 80239bd0 9d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84b6f780 Exception stack(0xdff59fb0 to 0xdff59ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:320:4739 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:320 state:D stack:0 pid:4739 tgid:4739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb285d84 r8:00000002 r7:60000113 r6:eb285d8c r5:851a4800 r4:851a4800 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851a4800 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb285e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535c440 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a4800 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaeab000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b278c r4:852b2400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852b278c r4:85340e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a4800 r8:85340e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85340e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85340e00 r8:8027ed34 r7:eb271e60 r6:85349a80 r5:851a4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb285fb0 to 0xeb285ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8535c240 INFO: task kworker/0:320:4739 is blocked on a mutex likely owned by task kworker/1:78:3491. task:kworker/1:78 state:R running task stack:0 pid:3491 tgid:3491 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d6c00 r8:80200be4 r7:dff59d54 r6:ffffffff r5:848d6c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff59d20 to 0xdff59d68) 9d20: 82b75000 dfc9d000 00000001 80239bb8 7f0f5000 00000001 82abe1c4 82abd5a0 9d40: 7f0f5000 dfc9d000 8280c9b4 dff59d9c dff59da0 dff59d70 80230af4 80239bd0 9d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff59dc0 r5:dff59e08 r4:dff59dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73c80 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfccb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb78c r4:84acb400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb78c r4:84b6f780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d6c00 r8:84b6f7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f780 r8:8027ed34 r7:dff41e60 r6:84b6e680 r5:848d6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff59fb0 to 0xdff59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:491:4741 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:491 state:D stack:0 pid:4741 tgid:4741 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb289d84 r8:00000002 r7:60000113 r6:eb289d8c r5:85269800 r4:85269800 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85269800 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb289e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85356500 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85269800 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafa5000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852dcf8c r4:852dcc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852dcf8c r4:85349b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85269800 r8:85349b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85349b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85349b00 r8:8027ed34 r7:eb25de60 r6:85349b80 r5:85269800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb289fb0 to 0xeb289ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85255e80 INFO: task kworker/1:491:4741 is blocked on a mutex likely owned by task kworker/1:78:3491. task:kworker/1:78 state:R running task stack:0 pid:3491 tgid:3491 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d6c00 r8:80200be4 r7:dff59d54 r6:ffffffff r5:848d6c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff59d20 to 0xdff59d68) 9d20: 8320a000 dfc9d000 00000001 80239bb8 7f0f5000 00000001 82abe1c4 82abd5a0 9d40: 7f0f5000 dfc9d000 8280c9b4 dff59d9c dff59da0 dff59d70 80230af4 80239bd0 9d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff59dc0 r5:dff59e08 r4:dff59dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73c80 r9:83018205 r8:848d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 r5:00001000 r4:dfccb000 r5:84acb78c r4:84acb400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb78c r4:84b6f780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d6c00 r8:84b6f7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f780 r8:8027ed34 r7:dff41e60 r6:84b6e680 r5:848d6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff59fb0 to 0xdff59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:321:4743 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:321 state:D stack:0 pid:4743 tgid:4743 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb291d84 r8:00000002 r7:60000113 r6:eb291d8c r5:85278c00 r4:85278c00 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85278c00 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb291e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535c5c0 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85278c00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaefd000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b2b8c r4:852b2800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852b2b8c r4:85340f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85278c00 r8:85340f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85340f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85340f00 r8:8027ed34 r7:eb271e60 r6:85349c00 r5:85278c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8535c380 INFO: task kworker/0:321:4743 is blocked on a mutex likely owned by task kworker/1:78:3491. task:kworker/1:78 state:R running task stack:0 pid:3491 tgid:3491 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d6c00 r8:80200be4 r7:dff59d54 r6:ffffffff r5:848d6c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff59d20 to 0xdff59d68) 9d20: 83377000 dfc9d000 00000001 80239bb8 7f0f5000 00000001 82abe1c4 82abd5a0 9d40: 7f0f5000 dfc9d000 8280c9b4 dff59d9c dff59da0 dff59d70 80230af4 80239bd0 9d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff59dc0 r5:dff59e08 r4:dff59dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73c80 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfccb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb78c r4:84acb400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb78c r4:84b6f780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d6c00 r8:84b6f7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f780 r8:8027ed34 r7:dff41e60 r6:84b6e680 r5:848d6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff59fb0 to 0xdff59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:322:4744 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:322 state:D stack:0 pid:4744 tgid:4744 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb299d84 r8:00000002 r7:60000113 r6:eb299d8c r5:85278000 r4:85278000 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85278000 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb299e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535c700 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85278000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf15000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b2f8c r4:852b2c00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852b2f8c r4:85340f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85278000 r8:85340fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85340f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85340f80 r8:8027ed34 r7:eb271e60 r6:85349c80 r5:85278000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb299fb0 to 0xeb299ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8535c500 INFO: task kworker/0:322:4744 is blocked on a mutex likely owned by task kworker/1:78:3491. task:kworker/1:78 state:R running task stack:0 pid:3491 tgid:3491 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d6c00 r8:80200be4 r7:dff59d54 r6:ffffffff r5:848d6c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff59d20 to 0xdff59d68) 9d20: 83845000 dfc9d000 00000001 80239bb8 7f0f5000 00000001 82abe1c4 82abd5a0 9d40: 7f0f5000 dfc9d000 8280c9b4 dff59d9c dff59da0 dff59d70 80230af4 80239bd0 9d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff59dc0 r5:dff59e08 r4:dff59dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73c80 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84b6f780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f780 r8:8027ed34 r7:dff41e60 r6:84b6e680 r5:848d6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff59fb0 to 0xdff59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:323:4747 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:323 state:D stack:0 pid:4747 tgid:4747 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb265d84 r8:00000002 r7:60000113 r6:eb265d8c r5:85326c00 r4:85326c00 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85326c00 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb265e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85365080 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85326c00 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e886d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b378c r4:852b3400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852b378c r4:85340e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85326c00 r8:85340eac r7:82804d40 r6:dddced40 r5:dddced60 r4:85340e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85340e80 r8:8027ed34 r7:eb271e60 r6:850fbf80 r5:85326c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb265fb0 to 0xeb265ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8535c640 INFO: task kworker/0:323:4747 is blocked on a mutex likely owned by task kworker/1:78:3491. task:kworker/1:78 state:R running task stack:0 pid:3491 tgid:3491 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d6c00 r8:80200be4 r7:dff59d54 r6:ffffffff r5:848d6c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff59d20 to 0xdff59d68) 9d20: 83af0000 dfc9d000 00000001 80239bb8 7f0f5000 00000001 82abe1c4 82abd5a0 9d40: 7f0f5000 dfc9d000 8280c9b4 dff59d9c dff59da0 dff59d70 80230af4 80239bd0 9d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff59dc0 r5:dff59e08 r4:dff59dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73c80 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfccb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb78c r4:84acb400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb78c r4:84b6f780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d6c00 r8:84b6f7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f780 r8:8027ed34 r7:dff41e60 r6:84b6e680 r5:848d6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff59fb0 to 0xdff59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:492:4750 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:492 state:D stack:0 pid:4750 tgid:4750 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb2a5d84 r8:00000002 r7:60000013 r6:eb2a5d8c r5:8530a400 r4:8530a400 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8530a400 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2a5e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85356700 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8530a400 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb00f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852dd78c r4:852dd400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852dd78c r4:85349d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8530a400 r8:85349d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85349d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85349d00 r8:8027ed34 r7:eb25de60 r6:85077f00 r5:8530a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2a5fb0 to 0xeb2a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853564c0 INFO: task kworker/1:492:4750 is blocked on a mutex likely owned by task kworker/1:78:3491. task:kworker/1:78 state:R running task stack:0 pid:3491 tgid:3491 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d6c00 r8:80200be4 r7:dff59d54 r6:ffffffff r5:848d6c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff59d20 to 0xdff59d68) 9d20: 83e23000 dfc9d000 00000001 80239bb8 7f0f5000 00000001 82abe1c4 82abd5a0 9d40: 7f0f5000 dfc9d000 8280c9b4 dff59d9c dff59da0 dff59d70 80230af4 80239bd0 9d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff59dc0 r5:dff59e08 r4:dff59dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73c80 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfccb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb78c r4:84acb400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb78c r4:84b6f780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d6c00 r8:84b6f7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f780 r8:8027ed34 r7:dff41e60 r6:84b6e680 r5:848d6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff59fb0 to 0xdff59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:493:4752 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:493 state:D stack:0 pid:4752 tgid:4752 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb2a9d84 r8:00000002 r7:60000013 r6:eb2a9d8c r5:85320c00 r4:85320c00 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85320c00 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2a9e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853568c0 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85320c00 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb021000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852ddb8c r4:852dd800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852ddb8c r4:85349d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85320c00 r8:85349dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85349d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85349d80 r8:8027ed34 r7:eb2a5e60 r6:85355000 r5:85320c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2a9fb0 to 0xeb2a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85356640 INFO: task kworker/1:493:4752 is blocked on a mutex likely owned by task kworker/1:78:3491. task:kworker/1:78 state:R running task stack:0 pid:3491 tgid:3491 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d6c00 r8:80200be4 r7:dff59d54 r6:ffffffff r5:848d6c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff59d20 to 0xdff59d68) 9d20: 83f4f000 dfc9d000 00000001 80239bb8 7f0f5000 00000001 82abe1c4 82abd5a0 9d40: 7f0f5000 dfc9d000 8280c9b4 dff59d9c dff59da0 dff59d70 80230af4 80239bd0 9d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff59dc0 r5:dff59e08 r4:dff59dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73c80 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfccb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb78c r4:84acb400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb78c r4:84b6f780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d6c00 r8:84b6f7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f780 r8:8027ed34 r7:dff41e60 r6:84b6e680 r5:848d6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff59fb0 to 0xdff59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:494:4754 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:494 state:D stack:0 pid:4754 tgid:4754 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb2b1d84 r8:00000002 r7:60000113 r6:eb2b1d8c r5:84956c00 r4:84956c00 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84956c00 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2b1e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85356b00 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84956c00 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb04b000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852de38c r4:852de000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852de38c r4:85349e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84956c00 r8:85349eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85349e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85349e80 r8:8027ed34 r7:eb2a9e60 r6:85355080 r5:84956c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2b1fb0 to 0xeb2b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85356800 INFO: task kworker/1:494:4754 is blocked on a mutex likely owned by task kworker/1:78:3491. task:kworker/1:78 state:R running task stack:0 pid:3491 tgid:3491 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d6c00 r8:80200be4 r7:dff59d54 r6:ffffffff r5:848d6c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff59d20 to 0xdff59d68) 9d20: 84471000 dfc9d000 00000001 80239bb8 7f0f5000 00000001 82abe1c4 82abd5a0 9d40: 7f0f5000 dfc9d000 8280c9b4 dff59d9c dff59da0 dff59d70 80230af4 80239bd0 9d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff59dc0 r5:dff59e08 r4:dff59dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73c80 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfccb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb78c r4:84acb400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb78c r4:84b6f780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d6c00 r8:84b6f7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f780 r8:8027ed34 r7:dff41e60 r6:84b6e680 r5:848d6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff59fb0 to 0xdff59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:495:4755 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:495 state:D stack:0 pid:4755 tgid:4755 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb2b5d84 r8:00000002 r7:60000113 r6:eb2b5d8c r5:85270000 r4:85270000 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85270000 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2b5e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853569c0 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85270000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb02d000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852ddf8c r4:852ddc00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852ddf8c r4:85349f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85270000 r8:85349fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85349f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85349f80 r8:8027ed34 r7:eb2b1e60 r6:85355100 r5:85270000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2b5fb0 to 0xeb2b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85356980 INFO: task kworker/1:495:4755 is blocked on a mutex likely owned by task kworker/1:78:3491. task:kworker/1:78 state:R running task stack:0 pid:3491 tgid:3491 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d6c00 r8:80200be4 r7:dff59d54 r6:ffffffff r5:848d6c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff59d20 to 0xdff59d68) 9d20: 849b4000 dfc9d000 00000001 80239bb8 7f0f5000 00000001 82abe1c4 82abd5a0 9d40: 7f0f5000 dfc9d000 8280c9b4 dff59d9c dff59da0 dff59d70 80230af4 80239bd0 9d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff59dc0 r5:dff59e08 r4:dff59dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73c80 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfccb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb78c r4:84acb400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb78c r4:84b6f780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d6c00 r8:84b6f7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f780 r8:8027ed34 r7:dff41e60 r6:84b6e680 r5:848d6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff59fb0 to 0xdff59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:496:4757 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:496 state:D stack:0 pid:4757 tgid:4757 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb2bdd84 r8:00000002 r7:60000013 r6:eb2bdd8c r5:85271800 r4:85271800 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85271800 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2bde08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85356bc0 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85271800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb055000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852de78c r4:852de400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852de78c r4:85349f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85271800 r8:85349f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85349f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85349f00 r8:8027ed34 r7:eb2b1e60 r6:85355180 r5:85271800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2bdfb0 to 0xeb2bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85356300 INFO: task kworker/1:496:4757 is blocked on a mutex likely owned by task kworker/1:78:3491. task:kworker/1:78 state:R running task stack:0 pid:3491 tgid:3491 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d6c00 r8:80200be4 r7:dff59d54 r6:ffffffff r5:848d6c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff59d20 to 0xdff59d68) 9d20: 84c6c000 dfc9d000 00000001 80239bb8 7f0f5000 00000001 82abe1c4 82abd5a0 9d40: 7f0f5000 dfc9d000 8280c9b4 dff59d9c dff59da0 dff59d70 80230af4 80239bd0 9d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff59dc0 r5:dff59e08 r4:dff59dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73c80 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfccb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb78c r4:84acb400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb78c r4:84b6f780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d6c00 r8:84b6f7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f780 r8:8027ed34 r7:dff41e60 r6:84b6e680 r5:848d6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff59fb0 to 0xdff59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:497:4759 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:497 state:D stack:0 pid:4759 tgid:4759 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb2c5d84 r8:00000002 r7:60000113 r6:eb2c5d8c r5:85270c00 r4:85270c00 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85270c00 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2c5e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85356b80 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85270c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0b1000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852df38c r4:852df000 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852df38c r4:85349e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85270c00 r8:85349e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85349e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85349e00 r8:8027ed34 r7:eb2bde60 r6:85355200 r5:85270c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2c5fb0 to 0xeb2c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85356c40 INFO: task kworker/1:497:4759 is blocked on a mutex likely owned by task kworker/1:78:3491. task:kworker/1:78 state:R running task stack:0 pid:3491 tgid:3491 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d6c00 r8:80200be4 r7:dff59d54 r6:ffffffff r5:848d6c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff59d20 to 0xdff59d68) 9d20: 852bd000 dfc9d000 00000001 80239bb8 7f0f5000 00000001 82abe1c4 82abd5a0 9d40: 7f0f5000 dfc9d000 8280c9b4 dff59d9c dff59da0 dff59d70 80230af4 80239bd0 9d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff59dc0 r5:dff59e08 r4:dff59dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73c80 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfccb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb78c r4:84acb400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb78c r4:84b6f780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d6c00 r8:84b6f7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f780 r8:8027ed34 r7:dff41e60 r6:84b6e680 r5:848d6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff59fb0 to 0xdff59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:498:4761 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:498 state:D stack:0 pid:4761 tgid:4761 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb2c9d84 r8:00000002 r7:60000113 r6:eb2c9d8c r5:85273000 r4:85273000 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85273000 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2c9e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85356dc0 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85273000 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb073000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852deb8c r4:852de800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852deb8c r4:85349900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85273000 r8:8534992c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85349900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85349900 r8:8027ed34 r7:eb2c5e60 r6:85355280 r5:85273000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2c9fb0 to 0xeb2c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85356300 INFO: task kworker/1:498:4761 is blocked on a mutex likely owned by task kworker/1:78:3491. task:kworker/1:78 state:R running task stack:0 pid:3491 tgid:3491 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d6c00 r8:80200be4 r7:dff59d54 r6:ffffffff r5:848d6c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff59d20 to 0xdff59d68) 9d20: 85602000 dfc9d000 00000001 80239bb8 7f0f5000 00000001 82abe1c4 82abd5a0 9d40: 7f0f5000 dfc9d000 8280c9b4 dff59d9c dff59da0 dff59d70 80230af4 80239bd0 9d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff59dc0 r5:dff59e08 r4:dff59dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73c80 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfccb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb78c r4:84acb400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb78c r4:84b6f780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d6c00 r8:84b6f7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f780 r8:8027ed34 r7:dff41e60 r6:84b6e680 r5:848d6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff59fb0 to 0xdff59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:499:4763 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:499 state:D stack:0 pid:4763 tgid:4763 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb2d1d84 r8:00000002 r7:60000013 r6:eb2d1d8c r5:85274800 r4:85274800 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85274800 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2d1e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85356ec0 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85274800 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0a3000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852def8c r4:852dec00 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852def8c r4:85349980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85274800 r8:853499ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85349980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85349980 r8:8027ed34 r7:eb2c5e60 r6:85355300 r5:85274800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2d1fb0 to 0xeb2d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85356d00 INFO: task kworker/1:499:4763 is blocked on a mutex likely owned by task kworker/1:78:3491. task:kworker/1:78 state:R running task stack:0 pid:3491 tgid:3491 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d6c00 r8:80200be4 r7:dff59d54 r6:ffffffff r5:848d6c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff59d20 to 0xdff59d68) 9d20: 85919000 dfc9d000 00000001 80239bb8 7f0f5000 00000001 82abe1c4 82abd5a0 9d40: 7f0f5000 dfc9d000 8280c9b4 dff59d9c dff59da0 dff59d70 80230af4 80239bd0 9d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff59dc0 r5:dff59e08 r4:dff59dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73c80 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfccb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb78c r4:84acb400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb78c r4:84b6f780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d6c00 r8:84b6f7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f780 r8:8027ed34 r7:dff41e60 r6:84b6e680 r5:848d6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff59fb0 to 0xdff59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:500:4765 blocked for more than 478 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:500 state:D stack:0 pid:4765 tgid:4765 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb2c1d84 r8:00000002 r7:60000113 r6:eb2c1d8c r5:8527bc00 r4:8527bc00 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8527bc00 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2c1e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535d040 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8527bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f011000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa1f000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852df78c r4:852df400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852df78c r4:85354100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8527bc00 r8:8535412c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85354100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85354100 r8:8027ed34 r7:eb2c5e60 r6:85354080 r5:8527bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2c1fb0 to 0xeb2c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85356e00 INFO: task kworker/1:500:4765 is blocked on a mutex likely owned by task kworker/1:78:3491. task:kworker/1:78 state:R running task stack:0 pid:3491 tgid:3491 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d6c00 r8:80200be4 r7:dff59d54 r6:ffffffff r5:848d6c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff59d20 to 0xdff59d68) 9d20: 85c11000 dfc9d000 00000001 80239bb8 7f0f5000 00000001 82abe1c4 82abd5a0 9d40: 7f0f5000 dfc9d000 8280c9b4 dff59d9c dff59da0 dff59d70 80230af4 80239bd0 9d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff59dc0 r5:dff59e08 r4:dff59dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73c80 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfccb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb78c r4:84acb400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb78c r4:84b6f780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d6c00 r8:84b6f7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f780 r8:8027ed34 r7:dff41e60 r6:84b6e680 r5:848d6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff59fb0 to 0xdff59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:501:4767 blocked for more than 479 seconds. Not tainted 6.16.0-rc1-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:501 state:D stack:0 pid:4767 tgid:4767 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28460>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a274d8>] (__schedule) from [<81a28460>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb2d5d84 r8:00000002 r7:60000113 r6:eb2d5d8c r5:8527d400 r4:8527d400 [<81a28434>] (schedule) from [<81a28848>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8527d400 r4:829185c0 [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28830>] (schedule_preempt_disabled) from [<81a2af2c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2ac2c>] (__mutex_lock.constprop.0) from [<81a2b3f8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2d5e08 r4:00000000 [<81a2b3e4>] (__mutex_lock_slowpath) from [<81a2b438>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b3fc>] (mutex_lock) from [<804e4ddc>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535d1c0 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8527d400 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb47000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852dfb8c r4:852df800 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852dfb8c r4:85354000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8527d400 r8:8535402c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85354000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85354000 r8:8027ed34 r7:eb2c1e60 r6:85354180 r5:8527d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2d5fb0 to 0xeb2d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85356f40 INFO: task kworker/1:501:4767 is blocked on a mutex likely owned by task kworker/1:78:3491. task:kworker/1:78 state:R running task stack:0 pid:3491 tgid:3491 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a274d8>] (__schedule) from [<81a28894>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848d6c00 r8:80200be4 r7:dff59d54 r6:ffffffff r5:848d6c00 r4:00000000 [<81a28854>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff59d20 to 0xdff59d68) 9d20: 860d8000 dfc9d000 00000001 80239bb8 7f0f5000 00000001 82abe1c4 82abd5a0 9d40: 7f0f5000 dfc9d000 8280c9b4 dff59d9c dff59da0 dff59d70 80230af4 80239bd0 9d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ba0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abe1e4 [<804e491c>] (__purge_vmap_area_lazy) from [<804e4f58>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff59dc0 r5:dff59e08 r4:dff59dc0 [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4d74>] (_vm_unmap_aliases) from [<804e8ccc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73c80 r4:00000000 [<804e8b60>] (vfree) from [<8054e7b4>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054e784>] (execmem_free) from [<803c6b94>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfccb000 [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b84>] (bpf_jit_free_exec) from [<803c6f74>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6f0c>] (bpf_jit_free) from [<803c8004>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84acb78c r4:84acb400 [<803c7eb8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84acb78c r4:84b6f780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d6c00 r8:84b6f7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b6f780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6f780 r8:8027ed34 r7:dff41e60 r6:84b6e680 r5:848d6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff59fb0 to 0xdff59ff8) 9fa0: 00000000 00000000 00000000 00000000