Extracting prog: 5m51.668654308s Minimizing prog: 1h48m12.099278267s Simplifying prog options: 0s Extracting C: 9m16.092833117s Simplifying C: 1h0m5.34741707s extracting reproducer from 1 programs testing a last program of every proc single: executing 1 programs separately with timeout 45s testing program (duration=45s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$TOKEN_CREATE-bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-close detailed listing: executing program 0: bpf$TOKEN_CREATE(0x24, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000000c0)='signal_generate\x00', r0}, 0x18) close(0x3) program did not crash single: failed to extract reproducer single: executing 1 programs separately with timeout 16m0s testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$TOKEN_CREATE-bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-close detailed listing: executing program 0: bpf$TOKEN_CREATE(0x24, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000000c0)='signal_generate\x00', r0}, 0x18) close(0x3) program crashed: lost connection to test machine single: successfully extracted reproducer found reproducer with 4 syscalls minimizing guilty program testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$TOKEN_CREATE-bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN detailed listing: executing program 0: bpf$TOKEN_CREATE(0x24, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000000c0)='signal_generate\x00', r0}, 0x18) program crashed: lost connection to test machine testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$TOKEN_CREATE-bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$TOKEN_CREATE(0x24, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$TOKEN_CREATE detailed listing: executing program 0: bpf$TOKEN_CREATE(0x24, 0x0, 0x0) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash extracting C reproducer testing compiled C program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases simplifying C reproducer testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:false Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases reproducing took 3h3m25.208217812s repro crashed as (corrupted=false): INFO: task kworker/0:1:10 blocked for more than 450 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1 state:D stack:0 pid:10 tgid:10 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df841d84 r8:00000002 r7:60000113 r6:df841d8c r5:8323ec00 r4:8323ec00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8323ec00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df841e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bce340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8323ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9d3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb2b8c r4:84bb2800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84bb2b8c r4:830b8500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8323ec00 r8:830b852c r7:82804d40 r6:dddced40 r5:dddced60 r4:830b8500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8500 r8:8027ed34 r7:df83de60 r6:830b8600 r5:8323ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf841fb0 to 0xdf841ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:830b6180 INFO: task kworker/0:1:10 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: a76fd000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 INFO: task kworker/0:2:43 blocked for more than 450 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:2 state:D stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df911d84 r8:00000002 r7:60000113 r6:df911d8c r5:833aa400 r4:833aa400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:833aa400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df911e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522f300 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:833aa400 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4c1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8599ef8c r4:8599ec00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8599ef8c r4:83363680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833aa400 r8:833636ac r7:82804d40 r6:dddced40 r5:dddced60 r4:83363680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83363680 r8:8027ed34 r7:df83de60 r6:83363700 r5:833aa400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8333e9c0 INFO: task kworker/0:2:43 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b34d0000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 INFO: task kworker/1:5:3120 blocked for more than 450 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:5 state:D stack:0 pid:3120 tgid:3120 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df9d1d84 r8:00000002 r7:60000113 r6:df9d1d8c r5:8413e000 r4:8413e000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8413e000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d1e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85086f40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8413e000 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9b5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb378c r4:84bb3400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb378c r4:84786900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8413e000 r8:8478692c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84786900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84786900 r8:8027ed34 r7:df9a1e60 r6:84786400 r5:8413e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9d1fb0 to 0xdf9d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84761140 INFO: task kworker/1:5:3120 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b572d000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 INFO: task kworker/0:0:3122 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:0 state:D stack:0 pid:3122 tgid:3122 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df95dd84 r8:00000002 r7:60000113 r6:df95dd8c r5:84139800 r4:84139800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84139800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df95de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bfb4c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84139800 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb93000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85060b8c r4:85060800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85060b8c r4:842b3b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84139800 r8:842b3bac r7:82804d40 r6:dddced40 r5:dddced60 r4:842b3b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:842b3b80 r8:8027ed34 r7:df841e60 r6:84786c00 r5:84139800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf95dfb0 to 0xdf95dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84895040 INFO: task kworker/0:0:3122 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b572d000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 INFO: task kworker/0:3:3123 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:3 state:D stack:0 pid:3123 tgid:3123 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df9e5d84 r8:00000002 r7:60000013 r6:df9e5d8c r5:8413b000 r4:8413b000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8413b000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6d840 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8413b000 r7:00000000 r6:83018000 r5:00001000 r4:7f011000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df967000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85062b8c r4:85062800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85062b8c r4:842b3b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8413b000 r8:842b3b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:842b3b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:842b3b00 r8:8027ed34 r7:df95de60 r6:84786800 r5:8413b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84895040 INFO: task kworker/0:3:3123 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b572d000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 INFO: task kworker/1:6:3124 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:6 state:D stack:0 pid:3124 tgid:3124 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df99dd84 r8:00000002 r7:60000113 r6:df99dd8c r5:8413d400 r4:8413d400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8413d400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df99de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8523f040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8413d400 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0683000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8493538c r4:84935000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8493538c r4:84786300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8413d400 r8:8478632c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84786300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84786300 r8:8027ed34 r7:df9d1e60 r6:84786b80 r5:8413d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf99dfb0 to 0xdf99dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84761200 INFO: task kworker/1:6:3124 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b572d000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 INFO: task kworker/0:4:3125 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:4 state:D stack:0 pid:3125 tgid:3125 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df9f1d84 r8:00000002 r7:60000113 r6:df9f1d8c r5:8413ec00 r4:8413ec00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8413ec00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f1e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516ab80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8413ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f011000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9c5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85261f8c r4:85261c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85261f8c r4:838a2100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8413ec00 r8:838a212c r7:82804d40 r6:dddced40 r5:dddced60 r4:838a2100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:838a2100 r8:8027ed34 r7:df9e5e60 r6:84786000 r5:8413ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84895040 INFO: task kworker/0:4:3125 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b572d000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 INFO: task kworker/1:7:3126 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:7 state:D stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df9f5d84 r8:00000002 r7:60000113 r6:df9f5d8c r5:8324a400 r4:8324a400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8324a400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85172b80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8324a400 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0611000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850e8f8c r4:850e8c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850e8f8c r4:84786880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8324a400 r8:847868ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84786880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84786880 r8:8027ed34 r7:df99de60 r6:84786980 r5:8324a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f5fb0 to 0xdf9f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84761400 INFO: task kworker/1:7:3126 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b572d000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 INFO: task kworker/0:5:3127 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:5 state:D stack:0 pid:3127 tgid:3127 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df9e1d84 r8:00000002 r7:60000113 r6:df9e1d8c r5:83a66000 r4:83a66000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a66000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e1e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518acc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:83a66000 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8817000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526078c r4:85260400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8526078c r4:838a2080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a66000 r8:838a20ac r7:82804d40 r6:dddced40 r5:dddced60 r4:838a2080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:838a2080 r8:8027ed34 r7:df9f1e60 r6:843f0780 r5:83a66000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e1fb0 to 0xdf9e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84895040 INFO: task kworker/0:5:3127 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b572d000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 INFO: task kworker/1:8:3129 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:8 state:D stack:0 pid:3129 tgid:3129 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa05d84 r8:00000002 r7:60000113 r6:dfa05d8c r5:83c53000 r4:83c53000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83c53000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa05e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84761600 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83c53000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff51000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850e978c r4:850e9400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850e978c r4:830cd100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83c53000 r8:830cd12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:830cd100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd100 r8:8027ed34 r7:df99de60 r6:830cd080 r5:83c53000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa05fb0 to 0xdfa05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84761640 INFO: task kworker/1:8:3129 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b572d000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:9:3131 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:9 state:D stack:0 pid:3131 tgid:3131 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa09d84 r8:00000002 r7:60000113 r6:dfa09d8c r5:83865400 r4:83865400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83865400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa09e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243a40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83865400 r7:00000000 r6:83018200 r5:00001000 r4:7f011000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df987000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850eb78c r4:850eb400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850eb78c r4:8449de00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83865400 r8:8449de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8449de00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8449de00 r8:8027ed34 r7:df99de60 r6:84286a80 r5:83865400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa09fb0 to 0xdfa09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84761640 INFO: task kworker/1:9:3131 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b572d000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:10:3133 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:10 state:D stack:0 pid:3133 tgid:3133 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df9fdd84 r8:00000002 r7:60000113 r6:df9fdd8c r5:83864800 r4:83864800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83864800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9fde08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b5cf80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83864800 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0623000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b738c r4:852b7000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852b738c r4:8449de80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83864800 r8:8449deac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8449de80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8449de80 r8:8027ed34 r7:df99de60 r6:84286b00 r5:83864800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9fdfb0 to 0xdf9fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847618c0 INFO: task kworker/1:10:3133 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b572d000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:6:3136 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:6 state:D stack:0 pid:3136 tgid:3136 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa19d84 r8:00000002 r7:60000113 r6:dfa19d8c r5:83a53000 r4:83a53000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a53000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa19e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd2640 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:83a53000 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05f1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526338c r4:85263000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8526338c r4:838b0b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a53000 r8:838b0b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:838b0b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:838b0b00 r8:8027ed34 r7:df9f1e60 r6:838b0c80 r5:83a53000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa19fb0 to 0xdfa19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84895700 INFO: task kworker/0:6:3136 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b572d000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:7:3137 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:7 state:D stack:0 pid:3137 tgid:3137 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa25d84 r8:00000002 r7:60000013 r6:dfa25d8c r5:83240c00 r4:83240c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83240c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa25e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84977a40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:83240c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeab000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85263b8c r4:85263800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85263b8c r4:838b0c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83240c00 r8:838b0c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:838b0c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:838b0c00 r8:8027ed34 r7:dfa19e60 r6:832a0180 r5:83240c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa25fb0 to 0xdfa25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84895540 INFO: task kworker/0:7:3137 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b572d000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:8:3139 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:8 state:D stack:0 pid:3139 tgid:3139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa2dd84 r8:00000002 r7:60000113 r6:dfa2dd8c r5:83ff1800 r4:83ff1800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ff1800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa2de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522f5c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:83ff1800 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5ab000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8599f78c r4:8599f400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8599f78c r4:830b8780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ff1800 r8:830b87ac r7:82804d40 r6:dddced40 r5:dddced60 r4:830b8780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8780 r8:8027ed34 r7:dfa25e60 r6:830b8700 r5:83ff1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa2dfb0 to 0xdfa2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848957c0 INFO: task kworker/0:8:3139 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b572d000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:11:3143 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:3143 tgid:3143 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa55d84 r8:00000002 r7:60000113 r6:dfa55d8c r5:83ff3c00 r4:83ff3c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ff3c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa55e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d7e40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83ff3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05a9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545db8c r4:8545d800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8545db8c r4:84884000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ff3c00 r8:8488402c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84884000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84884000 r8:8027ed34 r7:df99de60 r6:830b8480 r5:83ff3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa55fb0 to 0xdfa55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84761e80 INFO: task kworker/1:11:3143 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b572d000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:9:3144 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:3144 tgid:3144 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa5dd84 r8:00000002 r7:60000013 r6:dfa5dd8c r5:83ff2400 r4:83ff2400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ff2400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa5de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84895e40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:83ff2400 r7:00000000 r6:83018000 r5:00001000 r4:7f011000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa47000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8538378c r4:85383400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8538378c r4:830b8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ff2400 r8:830b842c r7:82804d40 r6:dddced40 r5:dddced60 r4:830b8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8400 r8:8027ed34 r7:dfa2de60 r6:8479be00 r5:83ff2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa5dfb0 to 0xdfa5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84895900 INFO: task kworker/0:9:3144 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b572d000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:12:3146 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:12 state:D stack:0 pid:3146 tgid:3146 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa65d84 r8:00000002 r7:60000113 r6:dfa65d8c r5:83ff0c00 r4:83ff0c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ff0c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa65e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85244740 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83ff0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa11000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84934f8c r4:84934c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84934f8c r4:84884080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ff0c00 r8:848840ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84884080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84884080 r8:8027ed34 r7:dfa55e60 r6:847a9000 r5:83ff0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa65fb0 to 0xdfa65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84761f00 INFO: task kworker/1:12:3146 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b572d000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:13:3147 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:13 state:D stack:0 pid:3147 tgid:3147 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa69d84 r8:00000002 r7:60000113 r6:dfa69d8c r5:83ff0000 r4:83ff0000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ff0000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa69e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b6440 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83ff0000 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e009f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853a6f8c r4:853a6c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853a6f8c r4:84884100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ff0000 r8:8488412c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84884100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84884100 r8:8027ed34 r7:dfa55e60 r6:847a9080 r5:83ff0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa69fb0 to 0xdfa69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84761f00 INFO: task kworker/1:13:3147 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b572d000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:14:3150 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:14 state:D stack:0 pid:3150 tgid:3150 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa85d84 r8:00000002 r7:60000113 r6:dfa85d8c r5:83ff4800 r4:83ff4800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ff4800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa85e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c73c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83ff4800 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb233000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8536ff8c r4:8536fc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8536ff8c r4:84884180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ff4800 r8:848841ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84884180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84884180 r8:8027ed34 r7:dfa55e60 r6:847a9100 r5:83ff4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa85fb0 to 0xdfa85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84890280 INFO: task kworker/1:14:3150 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b572d000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:15:3152 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:15 state:D stack:0 pid:3152 tgid:3152 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa91d84 r8:00000002 r7:60000113 r6:dfa91d8c r5:83ff6000 r4:83ff6000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ff6000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa91e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a3980 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83ff6000 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e044b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85434f8c r4:85434c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85434f8c r4:84884200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ff6000 r8:8488422c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84884200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84884200 r8:8027ed34 r7:dfa55e60 r6:847a9180 r5:83ff6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa91fb0 to 0xdfa91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84890100 INFO: task kworker/1:15:3152 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b572d000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:16:3154 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:16 state:D stack:0 pid:3154 tgid:3154 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa99d84 r8:00000002 r7:60000113 r6:dfa99d8c r5:83308c00 r4:83308c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83308c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa99e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552a2c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb509000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8543678c r4:85436400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8543678c r4:84884280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308c00 r8:848842ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84884280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84884280 r8:8027ed34 r7:dfa55e60 r6:847a9200 r5:83308c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa99fb0 to 0xdfa99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84890200 INFO: task kworker/1:16:3154 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b572d000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:10:3155 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:3155 tgid:3155 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfaa5d84 r8:00000002 r7:60000113 r6:dfaa5d8c r5:84142400 r4:84142400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84142400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522f440 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84142400 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4df000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8599f38c r4:8599f000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8599f38c r4:847a9280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84142400 r8:847a92ac r7:82804d40 r6:dddced40 r5:dddced60 r4:847a9280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a9280 r8:8027ed34 r7:dfa2de60 r6:847a9300 r5:84142400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa5fb0 to 0xdfaa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:844b4200 INFO: task kworker/0:10:3155 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b5ae7000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:17:3157 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:17 state:D stack:0 pid:3157 tgid:3157 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfaadd84 r8:00000002 r7:60000113 r6:dfaadd8c r5:844fb000 r4:844fb000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844fb000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaade08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552af80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:844fb000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0625000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85436b8c r4:85436800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85436b8c r4:84884300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844fb000 r8:8488432c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84884300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84884300 r8:8027ed34 r7:dfa55e60 r6:847a9380 r5:844fb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaadfb0 to 0xdfaadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848903c0 INFO: task kworker/1:17:3157 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b5ae7000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:18:3159 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:18 state:D stack:0 pid:3159 tgid:3159 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfab9d84 r8:00000002 r7:60000113 r6:dfab9d8c r5:844fbc00 r4:844fbc00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844fbc00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85643840 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:844fbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb68d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84938f8c r4:84938c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84938f8c r4:84884380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844fbc00 r8:848843ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84884380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84884380 r8:8027ed34 r7:dfa55e60 r6:847a9400 r5:844fbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab9fb0 to 0xdfab9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84890500 INFO: task kworker/1:18:3159 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b5ae7000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:19:3161 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:19 state:D stack:0 pid:3161 tgid:3161 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfac9d84 r8:00000002 r7:60000113 r6:dfac9d8c r5:844fd400 r4:844fd400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844fd400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85643600 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:844fd400 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0441000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8493938c r4:84939000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8493938c r4:84884400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844fd400 r8:8488442c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84884400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84884400 r8:8027ed34 r7:dfa55e60 r6:847a9480 r5:844fd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfac9fb0 to 0xdfac9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84890640 INFO: task kworker/1:19:3161 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b5ae7000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:20:3163 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:20 state:D stack:0 pid:3163 tgid:3163 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfad5d84 r8:00000002 r7:60000113 r6:dfad5d8c r5:83300000 r4:83300000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83300000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85671f00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83300000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06ff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545c78c r4:8545c400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8545c78c r4:84884480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83300000 r8:848844ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84884480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84884480 r8:8027ed34 r7:dfa55e60 r6:847a9500 r5:83300000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad5fb0 to 0xdfad5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84890780 INFO: task kworker/1:20:3163 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b5ae7000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:21:3165 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:21 state:D stack:0 pid:3165 tgid:3165 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfae5d84 r8:00000002 r7:60000113 r6:dfae5d8c r5:83306000 r4:83306000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83306000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85817280 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83306000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa91000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a138c r4:856a1000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856a138c r4:84884500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83306000 r8:8488452c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84884500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84884500 r8:8027ed34 r7:dfa55e60 r6:847a9580 r5:83306000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae5fb0 to 0xdfae5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848908c0 INFO: task kworker/1:21:3165 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b5ae7000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:22:3167 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:22 state:D stack:0 pid:3167 tgid:3167 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa39d84 r8:00000002 r7:60000113 r6:dfa39d8c r5:83c53c00 r4:83c53c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83c53c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa39e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8579b400 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83c53c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb6d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85754b8c r4:85754800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85754b8c r4:84884580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83c53c00 r8:848845ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84884580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84884580 r8:8027ed34 r7:dfae5e60 r6:84884600 r5:83c53c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa39fb0 to 0xdfa39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848909c0 INFO: task kworker/1:22:3167 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b5ae7000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:23:3170 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:23 state:D stack:0 pid:3170 tgid:3170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfaf9d84 r8:00000002 r7:60000113 r6:dfaf9d8c r5:83c54800 r4:83c54800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83c54800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857901c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83c54800 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec471000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a078c r4:856a0400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856a078c r4:84884680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83c54800 r8:848846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84884680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84884680 r8:8027ed34 r7:dfae5e60 r6:84884700 r5:83c54800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf9fb0 to 0xdfaf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84890f40 INFO: task kworker/1:23:3170 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b5ae7000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:24:3173 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:24 state:D stack:0 pid:3173 tgid:3173 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb0dd84 r8:00000002 r7:60000113 r6:dfb0dd8c r5:83a76c00 r4:83a76c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a76c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb0de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84891f40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83a76c00 r7:00000000 r6:83018200 r5:00001000 r4:7f011000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb03000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a238c r4:856a2000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856a238c r4:84884780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a76c00 r8:848847ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84884780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84884780 r8:8027ed34 r7:dfae5e60 r6:84884800 r5:83a76c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb0dfb0 to 0xdfb0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84895c80 INFO: task kworker/1:24:3173 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b5ae7000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:25:3174 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:25 state:D stack:0 pid:3174 tgid:3174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa45d84 r8:00000002 r7:60000113 r6:dfa45d8c r5:849a0000 r4:849a0000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849a0000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa45e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84891bc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:849a0000 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4bb000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a178c r4:856a1400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856a178c r4:84884880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849a0000 r8:848848ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84884880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84884880 r8:8027ed34 r7:dfb0de60 r6:84884900 r5:849a0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa45fb0 to 0xdfa45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84895c80 INFO: task kworker/1:25:3174 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b5ae7000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:26:3176 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:26 state:D stack:0 pid:3176 tgid:3176 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb15d84 r8:00000002 r7:60000113 r6:dfb15d8c r5:849a0c00 r4:849a0c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849a0c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb15e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85083f40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:849a0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb3f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8493b78c r4:8493b400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8493b78c r4:84884980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849a0c00 r8:848849ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84884980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84884980 r8:8027ed34 r7:dfb0de60 r6:84884a00 r5:849a0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb15fb0 to 0xdfb15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848aa000 INFO: task kworker/1:26:3176 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b78c7000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:27:3178 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:27 state:D stack:0 pid:3178 tgid:3178 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb21d84 r8:00000002 r7:60000113 r6:dfb21d8c r5:849a1800 r4:849a1800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849a1800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb21e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85900f40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:849a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec41d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8493b38c r4:8493b000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8493b38c r4:84884a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849a1800 r8:84884aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84884a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84884a80 r8:8027ed34 r7:dfb15e60 r6:84884b00 r5:849a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb21fb0 to 0xdfb21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848aa180 INFO: task kworker/1:27:3178 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b808f000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:28:3179 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:28 state:D stack:0 pid:3179 tgid:3179 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb29d84 r8:00000002 r7:60000113 r6:dfb29d8c r5:849a2400 r4:849a2400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849a2400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb29e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d9d80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:849a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb929000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8599d38c r4:8599d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8599d38c r4:84884b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849a2400 r8:84884bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84884b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84884b80 r8:8027ed34 r7:dfb15e60 r6:84884c00 r5:849a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb29fb0 to 0xdfb29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848aa180 INFO: task kworker/1:28:3179 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b8387000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:29:3182 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:29 state:D stack:0 pid:3182 tgid:3182 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb3dd84 r8:00000002 r7:60000113 r6:dfb3dd8c r5:849a3c00 r4:849a3c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849a3c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb3de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dfa00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:849a3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb991000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858baf8c r4:858bac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858baf8c r4:84884c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849a3c00 r8:84884cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84884c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84884c80 r8:8027ed34 r7:dfb29e60 r6:84884d00 r5:849a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb3dfb0 to 0xdfb3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848aa480 INFO: task kworker/1:29:3182 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b8631000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:30:3183 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:30 state:D stack:0 pid:3183 tgid:3183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb49d84 r8:00000002 r7:60000113 r6:dfb49d8c r5:83302400 r4:83302400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83302400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb49e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ba600 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83302400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec3c9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c078c r4:858c0400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858c078c r4:84884d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83302400 r8:84884dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84884d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84884d80 r8:8027ed34 r7:dfb3de60 r6:847a9600 r5:83302400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb49fb0 to 0xdfb49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848aa480 INFO: task kworker/1:30:3183 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b89cf000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:31:3186 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:31 state:D stack:0 pid:3186 tgid:3186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb5dd84 r8:00000002 r7:60000113 r6:dfb5dd8c r5:83305400 r4:83305400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83305400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb5de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a0d8c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83305400 r7:00000000 r6:83018200 r5:00001000 r4:7f0e5000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec611000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a1df8c r4:85a1dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a1df8c r4:84884e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83305400 r8:84884eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84884e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84884e80 r8:8027ed34 r7:dfb49e60 r6:847a9680 r5:83305400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb5dfb0 to 0xdfb5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848aa880 INFO: task kworker/1:31:3186 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b89cf000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:32:3188 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:32 state:D stack:0 pid:3188 tgid:3188 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb69d84 r8:00000002 r7:60000113 r6:dfb69d8c r5:83301800 r4:83301800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83301800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb69e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855d8a40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83301800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec3a7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c138c r4:858c1000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858c138c r4:84884f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83301800 r8:84884f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84884f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84884f00 r8:8027ed34 r7:dfb5de60 r6:847a9700 r5:83301800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb69fb0 to 0xdfb69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848aabc0 INFO: task kworker/1:32:3188 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b9676000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:33:3190 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:33 state:D stack:0 pid:3190 tgid:3190 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb6dd84 r8:00000002 r7:60000113 r6:dfb6dd8c r5:84508c00 r4:84508c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84508c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb6de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8576c440 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84508c00 r7:00000000 r6:83018200 r5:00001000 r4:7f191000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc11000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c238c r4:858c2000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858c238c r4:84884f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84508c00 r8:84884fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84884f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84884f80 r8:8027ed34 r7:dfb69e60 r6:847a9780 r5:84508c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb6dfb0 to 0xdfb6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848aa980 INFO: task kworker/1:33:3190 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: bb290000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:34:3192 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:34 state:D stack:0 pid:3192 tgid:3192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb81d84 r8:00000002 r7:60000113 r6:dfb81d8c r5:8450a400 r4:8450a400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8450a400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb81e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a65c40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8450a400 r7:00000000 r6:83018200 r5:00001000 r4:7f20f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecdd7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a43f8c r4:85a43c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a43f8c r4:849af080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8450a400 r8:849af0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:849af080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849af080 r8:8027ed34 r7:dfb6de60 r6:847a9800 r5:8450a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb81fb0 to 0xdfb81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848aac40 INFO: task kworker/1:34:3192 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: bbdb5000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:35:3193 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:35 state:D stack:0 pid:3193 tgid:3193 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb61d84 r8:00000002 r7:60000113 r6:dfb61d8c r5:849a5400 r4:849a5400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849a5400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb61e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848aad80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:849a5400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb59000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c3f8c r4:858c3c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858c3f8c r4:849af000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849a5400 r8:849af02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:849af000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849af000 r8:8027ed34 r7:dfb81e60 r6:849af100 r5:849a5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb61fb0 to 0xdfb61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848aac40 INFO: task kworker/1:35:3193 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: bbdb5000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:36:3197 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:36 state:D stack:0 pid:3197 tgid:3197 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb79d84 r8:00000002 r7:60000113 r6:dfb79d8c r5:849a6000 r4:849a6000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849a6000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb79e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84add440 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:849a6000 r7:00000000 r6:83018200 r5:00001000 r4:7f297000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecde1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8493df8c r4:8493dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8493df8c r4:849af180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849a6000 r8:849af1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:849af180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849af180 r8:8027ed34 r7:dfb81e60 r6:849af200 r5:849a6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb79fb0 to 0xdfb79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84890fc0 INFO: task kworker/1:36:3197 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: bca70000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:37:3198 blocked for more than 453 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:37 state:D stack:0 pid:3198 tgid:3198 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb51d84 r8:00000002 r7:60000113 r6:dfb51d8c r5:849a6c00 r4:849a6c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849a6c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb51e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85808200 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:849a6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb75000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8493db8c r4:8493d800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8493db8c r4:849af280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849a6c00 r8:849af2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:849af280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849af280 r8:8027ed34 r7:dfb79e60 r6:849af300 r5:849a6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb51fb0 to 0xdfb51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84890fc0 INFO: task kworker/1:37:3198 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: bca70000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:38:3200 blocked for more than 453 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:38 state:D stack:0 pid:3200 tgid:3200 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb99d84 r8:00000002 r7:60000013 r6:dfb99d8c r5:849a3000 r4:849a3000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849a3000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb99e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856703c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:849a3000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec649000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b50f8c r4:85b50c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b50f8c r4:849af400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849a3000 r8:849af42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:849af400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849af400 r8:8027ed34 r7:dfb79e60 r6:849af480 r5:849a3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb99fb0 to 0xdfb99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ade280 INFO: task kworker/1:38:3200 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: bcedd000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:39:3202 blocked for more than 453 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:39 state:D stack:0 pid:3202 tgid:3202 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfba5d84 r8:00000002 r7:60000113 r6:dfba5d8c r5:849a4800 r4:849a4800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849a4800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84addd00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:849a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb8d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8493e38c r4:8493e000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8493e38c r4:849af380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849a4800 r8:849af3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:849af380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849af380 r8:8027ed34 r7:dfb99e60 r6:849af500 r5:849a4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfba5fb0 to 0xdfba5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ade0c0 INFO: task kworker/1:39:3202 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: bf9d7000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:11:3207 blocked for more than 453 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3207 tgid:3207 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfbb9d84 r8:00000002 r7:60000013 r6:dfbb9d8c r5:8450c800 r4:8450c800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8450c800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522fa40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8450c800 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec673000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859a478c r4:859a4400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859a478c r4:847a9880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8450c800 r8:847a98ac r7:82804d40 r6:dddced40 r5:dddced60 r4:847a9880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a9880 r8:8027ed34 r7:dfa2de60 r6:847a9900 r5:8450c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbb9fb0 to 0xdfbb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae70c0 INFO: task kworker/0:11:3207 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: bfed2000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:12:3208 blocked for more than 453 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3208 tgid:3208 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfbadd84 r8:00000002 r7:60000113 r6:dfbadd8c r5:8450bc00 r4:8450bc00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8450bc00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbade08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522f740 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8450bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec633000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8599fb8c r4:8599f800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8599fb8c r4:847a9980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8450bc00 r8:847a99ac r7:82804d40 r6:dddced40 r5:dddced60 r4:847a9980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a9980 r8:8027ed34 r7:dfbb9e60 r6:847a9a00 r5:8450bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbadfb0 to 0xdfbadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae70c0 INFO: task kworker/0:12:3208 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: c02dc000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:13:3210 blocked for more than 453 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:13 state:D stack:0 pid:3210 tgid:3210 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfbbdd84 r8:00000002 r7:60000013 r6:dfbbdd8c r5:8450d400 r4:8450d400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8450d400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbbde08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522f940 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8450d400 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec659000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859a438c r4:859a4000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859a438c r4:847a9a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8450d400 r8:847a9aac r7:82804d40 r6:dddced40 r5:dddced60 r4:847a9a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a9a80 r8:8027ed34 r7:dfbb9e60 r6:847a9b00 r5:8450d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbbdfb0 to 0xdfbbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae7200 INFO: task kworker/0:13:3210 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: c13c6000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:40:3212 blocked for more than 453 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:40 state:D stack:0 pid:3212 tgid:3212 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfbc5d84 r8:00000002 r7:60000113 r6:dfbc5d8c r5:84508000 r4:84508000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84508000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855fa840 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84508000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb9b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c05b8c r4:85c05800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c05b8c r4:849af580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84508000 r8:849af5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:849af580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849af580 r8:8027ed34 r7:dfb99e60 r6:847a9b80 r5:84508000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbc5fb0 to 0xdfbc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ade580 INFO: task kworker/1:40:3212 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: c17af000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:14:3213 blocked for more than 453 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:3213 tgid:3213 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfbd9d84 r8:00000002 r7:60000113 r6:dfbd9d8c r5:84509800 r4:84509800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84509800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522fc80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84509800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6a1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859a4f8c r4:859a4c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859a4f8c r4:847a9c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84509800 r8:847a9c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:847a9c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a9c00 r8:8027ed34 r7:dfbb9e60 r6:847a9c80 r5:84509800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd9fb0 to 0xdfbd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae7580 INFO: task kworker/0:14:3213 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: c1cdf000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:15:3215 blocked for more than 453 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:3215 tgid:3215 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfbd1d84 r8:00000002 r7:60000113 r6:dfbd1d8c r5:8450ec00 r4:8450ec00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8450ec00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd1e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522fac0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8450ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec683000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859a4b8c r4:859a4800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859a4b8c r4:847a9d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8450ec00 r8:847a9d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:847a9d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a9d00 r8:8027ed34 r7:dfbd9e60 r6:847a9d80 r5:8450ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd1fb0 to 0xdfbd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae74c0 INFO: task kworker/0:15:3215 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: c1cdf000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:16:3220 blocked for more than 453 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:16 state:D stack:0 pid:3220 tgid:3220 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfc01d84 r8:00000002 r7:60000013 r6:dfc01d8c r5:84922400 r4:84922400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84922400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc01e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522fe40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84922400 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7db000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859a578c r4:859a5400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859a578c r4:847a9e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84922400 r8:847a9eac r7:82804d40 r6:dddced40 r5:dddced60 r4:847a9e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a9e80 r8:8027ed34 r7:dfbd9e60 r6:849af680 r5:84922400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc01fb0 to 0xdfc01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae7900 INFO: task kworker/0:16:3220 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: c2092000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:17:3222 blocked for more than 453 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:17 state:D stack:0 pid:3222 tgid:3222 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfc15d84 r8:00000002 r7:60000113 r6:dfc15d8c r5:84923000 r4:84923000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84923000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc15e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522fd00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84923000 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6b1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859a538c r4:859a5000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859a538c r4:847a9f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84923000 r8:847a9f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:847a9f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a9f00 r8:8027ed34 r7:dfc01e60 r6:849af700 r5:84923000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc15fb0 to 0xdfc15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae7ac0 INFO: task kworker/0:17:3222 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: c2309000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:18:3223 blocked for more than 454 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:18 state:D stack:0 pid:3223 tgid:3223 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfc19d84 r8:00000002 r7:60000113 r6:dfc19d8c r5:84921800 r4:84921800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84921800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc19e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854aec00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84921800 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec82d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b9b8c r4:858b9800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858b9b8c r4:847a9f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84921800 r8:847a9fac r7:82804d40 r6:dddced40 r5:dddced60 r4:847a9f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a9f80 r8:8027ed34 r7:dfc01e60 r6:849af780 r5:84921800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc19fb0 to 0xdfc19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae7ac0 INFO: task kworker/0:18:3223 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: c3102000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:19:3225 blocked for more than 454 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:19 state:D stack:0 pid:3225 tgid:3225 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfc25d84 r8:00000002 r7:60000113 r6:dfc25d8c r5:84920c00 r4:84920c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84920c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc25e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522ff40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84920c00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7ed000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859a5b8c r4:859a5800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859a5b8c r4:84ad8000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84920c00 r8:84ad802c r7:82804d40 r6:dddced40 r5:dddced60 r4:84ad8000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ad8000 r8:8027ed34 r7:dfc19e60 r6:849af800 r5:84920c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc25fb0 to 0xdfc25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae7f00 INFO: task kworker/0:19:3225 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: c3102000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:20:3227 blocked for more than 454 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:20 state:D stack:0 pid:3227 tgid:3227 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfc2dd84 r8:00000002 r7:60000113 r6:dfc2dd8c r5:84923c00 r4:84923c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84923c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc2de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854be040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84923c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7fd000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859a5f8c r4:859a5c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859a5f8c r4:84ad8080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84923c00 r8:84ad80ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ad8080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ad8080 r8:8027ed34 r7:dfc19e60 r6:849af880 r5:84923c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc2dfb0 to 0xdfc2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae7d80 INFO: task kworker/0:20:3227 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: c4360000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:21:3230 blocked for more than 454 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:21 state:D stack:0 pid:3230 tgid:3230 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfc41d84 r8:00000002 r7:60000113 r6:dfc41d8c r5:84924800 r4:84924800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84924800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc41e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854be140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84924800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec817000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859a638c r4:859a6000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859a638c r4:84ad8100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84924800 r8:84ad812c r7:82804d40 r6:dddced40 r5:dddced60 r4:84ad8100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ad8100 r8:8027ed34 r7:dfc19e60 r6:849af900 r5:84924800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc41fb0 to 0xdfc41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849ae100 INFO: task kworker/0:21:3230 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: c5c0f000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:22:3231 blocked for more than 454 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:22 state:D stack:0 pid:3231 tgid:3231 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfc45d84 r8:00000002 r7:60000113 r6:dfc45d8c r5:84926000 r4:84926000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84926000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc45e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854be900 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84926000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8fb000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859a6b8c r4:859a6800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859a6b8c r4:84ad8180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84926000 r8:84ad81ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ad8180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ad8180 r8:8027ed34 r7:dfc19e60 r6:849af980 r5:84926000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc45fb0 to 0xdfc45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849ae100 INFO: task kworker/0:22:3231 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: c5c10000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:23:3233 blocked for more than 454 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:23 state:D stack:0 pid:3233 tgid:3233 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfc29d84 r8:00000002 r7:60000113 r6:dfc29d8c r5:84aa2400 r4:84aa2400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84aa2400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc29e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854be540 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84aa2400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec85b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859a678c r4:859a6400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859a678c r4:84ad8200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84aa2400 r8:84ad822c r7:82804d40 r6:dddced40 r5:dddced60 r4:84ad8200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ad8200 r8:8027ed34 r7:dfc45e60 r6:84ad8280 r5:84aa2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc29fb0 to 0xdfc29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849ae200 INFO: task kworker/0:23:3233 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: c5eb9000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:132:3497 blocked for more than 454 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:132 state:D stack:0 pid:3497 tgid:3497 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfe69d84 r8:00000002 r7:60000013 r6:dfe69d8c r5:84b44800 r4:84b44800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b44800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe69e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bce540 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84b44800 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848eb78c r4:848eb400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:848eb78c r4:84bd5900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b44800 r8:84bd592c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bd5900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd5900 r8:8027ed34 r7:dfe2de60 r6:84be5580 r5:84b44800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe69fb0 to 0xdfe69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be22c0 INFO: task kworker/0:132:3497 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: c61f4000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:84:3544 blocked for more than 454 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:84 state:D stack:0 pid:3544 tgid:3544 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dffc9d84 r8:00000002 r7:60000113 r6:dffc9d8c r5:8500ec00 r4:8500ec00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8500ec00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffc9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85bc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0f8c r4:84bb0c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0f8c r4:84be0b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:84be0bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0b80 r8:8027ed34 r7:dffc5e60 r6:84be0c00 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85280 INFO: task kworker/1:84:3544 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: c6fa8000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:134:3546 blocked for more than 454 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:134 state:D stack:0 pid:3546 tgid:3546 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dffd1d84 r8:00000002 r7:60000113 r6:dffd1d8c r5:85010c00 r4:85010c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85010c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffd1e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd8e40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85010c00 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848eab8c r4:848ea800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:848eab8c r4:84bd5a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85010c00 r8:84bd5a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bd5a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd5a00 r8:8027ed34 r7:dfe69e60 r6:84be0c80 r5:85010c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd1fb0 to 0xdffd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2a80 INFO: task kworker/0:134:3546 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: c830b000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:87:3552 blocked for more than 454 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:87 state:D stack:0 pid:3552 tgid:3552 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dffbdd84 r8:00000002 r7:60000013 r6:dffbdd8c r5:85013000 r4:85013000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85013000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffbde08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85d40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85013000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfec3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb138c r4:84bb1000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb138c r4:84be0f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85013000 r8:84be0f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0f00 r8:8027ed34 r7:dffc9e60 r6:84be0f80 r5:85013000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffbdfb0 to 0xdffbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b80 INFO: task kworker/1:87:3552 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: c9d02000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:88:3554 blocked for more than 454 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:88 state:D stack:0 pid:3554 tgid:3554 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dffd9d84 r8:00000002 r7:60000013 r6:dffd9d8c r5:85014800 r4:85014800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85014800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffd9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b81100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85014800 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff0d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb1b8c r4:84bb1800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb1b8c r4:84b83000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85014800 r8:84b8302c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b83000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b83000 r8:8027ed34 r7:dffbde60 r6:84b83080 r5:85014800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd9fb0 to 0xdffd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85c80 INFO: task kworker/1:88:3554 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: ca418000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:135:3556 blocked for more than 454 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:135 state:D stack:0 pid:3556 tgid:3556 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dffddd84 r8:00000002 r7:60000113 r6:dffddd8c r5:8412c800 r4:8412c800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8412c800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffdde08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bce040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8412c800 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfef9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848eaf8c r4:848eac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:848eaf8c r4:84bd5a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8412c800 r8:84bd5aac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bd5a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd5a80 r8:8027ed34 r7:dfe69e60 r6:84bd5b00 r5:8412c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffddfb0 to 0xdffddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bd8500 INFO: task kworker/0:135:3556 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: caa89000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:89:3557 blocked for more than 454 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:89 state:D stack:0 pid:3557 tgid:3557 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dffe1d84 r8:00000002 r7:60000113 r6:dffe1d8c r5:85013c00 r4:85013c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85013c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffe1e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bcde40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85013c00 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb178c r4:84bb1400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb178c r4:84b83100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85013c00 r8:84b8312c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b83100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b83100 r8:8027ed34 r7:dffd9e60 r6:84b83180 r5:85013c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85fc0 INFO: task kworker/1:89:3557 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: cb412000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:136:3560 blocked for more than 454 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:136 state:D stack:0 pid:3560 tgid:3560 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dffe9d84 r8:00000002 r7:60000013 r6:dffe9d8c r5:85015400 r4:85015400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85015400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffe9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bce440 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85015400 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadb000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848eb38c r4:848eb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:848eb38c r4:84bd5b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85015400 r8:84bd5bac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bd5b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd5b80 r8:8027ed34 r7:dfe69e60 r6:84b83200 r5:85015400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe9fb0 to 0xdffe9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bce000 INFO: task kworker/0:136:3560 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: cb412000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:90:3562 blocked for more than 454 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:90 state:D stack:0 pid:3562 tgid:3562 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfff1d84 r8:00000002 r7:60000013 r6:dfff1d8c r5:85010000 r4:85010000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85010000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfff1e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b81400 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85010000 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb1f8c r4:84bb1c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb1f8c r4:84b83280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85010000 r8:84b832ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b83280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b83280 r8:8027ed34 r7:dffd9e60 r6:84b83300 r5:85010000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfff1fb0 to 0xdfff1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b810c0 INFO: task kworker/1:90:3562 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: cc5ba000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:91:3563 blocked for more than 454 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:91 state:D stack:0 pid:3563 tgid:3563 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dffedd84 r8:00000002 r7:60000113 r6:dffedd8c r5:85016000 r4:85016000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85016000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffede08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b81640 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85016000 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfff7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb238c r4:84bb2000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb238c r4:84b83380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85016000 r8:84b833ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b83380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b83380 r8:8027ed34 r7:dfff1e60 r6:84b83400 r5:85016000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffedfb0 to 0xdffedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b813c0 INFO: task kworker/1:91:3563 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: cd4f2000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:92:3565 blocked for more than 454 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:92 state:D stack:0 pid:3565 tgid:3565 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfff5d84 r8:00000002 r7:60000113 r6:dfff5d8c r5:84b4d400 r4:84b4d400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b4d400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfff5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84761000 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84b4d400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfac3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850b838c r4:850b8000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850b838c r4:84b83480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b4d400 r8:84b834ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b83480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b83480 r8:8027ed34 r7:dffede60 r6:84b83500 r5:84b4d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfff5fb0 to 0xdfff5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b813c0 INFO: task kworker/1:92:3565 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: ceb28000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:137:3571 blocked for more than 455 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:137 state:D stack:0 pid:3571 tgid:3571 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0009d84 r8:00000002 r7:60000013 r6:e0009d8c r5:85021800 r4:85021800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85021800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0009e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bce640 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85021800 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb25000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848ebb8c r4:848eb800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:848ebb8c r4:84bd5c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85021800 r8:84bd5c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bd5c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd5c00 r8:8027ed34 r7:dfe69e60 r6:84b83580 r5:85021800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0009fb0 to 0xe0009ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bce4c0 INFO: task kworker/0:137:3571 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: ced97000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:138:3573 blocked for more than 455 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:138 state:D stack:0 pid:3573 tgid:3573 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0011d84 r8:00000002 r7:60000013 r6:e0011d8c r5:85022400 r4:85022400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85022400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0011e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bcea80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85022400 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfba9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848ec78c r4:848ec400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:848ec78c r4:84bd5c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85022400 r8:84bd5cac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bd5c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd5c80 r8:8027ed34 r7:e0009e60 r6:84b83600 r5:85022400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0011fb0 to 0xe0011ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bce5c0 INFO: task kworker/0:138:3573 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: cf0fe000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:139:3574 blocked for more than 455 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:139 state:D stack:0 pid:3574 tgid:3574 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0015d84 r8:00000002 r7:60000013 r6:e0015d8c r5:85023000 r4:85023000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85023000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0015e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bce700 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85023000 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb4b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848ebf8c r4:848ebc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:848ebf8c r4:84bd5d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85023000 r8:84bd5d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bd5d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd5d00 r8:8027ed34 r7:e0011e60 r6:84b83680 r5:85023000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0015fb0 to 0xe0015ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bce5c0 INFO: task kworker/0:139:3574 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: cf0fe000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:140:3576 blocked for more than 455 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:140 state:D stack:0 pid:3576 tgid:3576 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e001dd84 r8:00000002 r7:60000113 r6:e001dd8c r5:85020000 r4:85020000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85020000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e001de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bce880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85020000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb71000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84935f8c r4:84935c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84935f8c r4:84bd5d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85020000 r8:84bd5dac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bd5d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd5d80 r8:8027ed34 r7:e0011e60 r6:84b83700 r5:85020000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe001dfb0 to 0xe001dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bce740 INFO: task kworker/0:140:3576 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: cf0fe000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:141:3580 blocked for more than 455 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:141 state:D stack:0 pid:3580 tgid:3580 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e002dd84 r8:00000002 r7:60000013 r6:e002dd8c r5:85023c00 r4:85023c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85023c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e002de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bce940 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85023c00 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb91000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848ec38c r4:848ec000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:848ec38c r4:84bd5e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85023c00 r8:84bd5e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bd5e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd5e00 r8:8027ed34 r7:e0011e60 r6:84b83780 r5:85023c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe002dfb0 to 0xe002dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bce5c0 INFO: task kworker/0:141:3580 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: cf0fe000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:142:3581 blocked for more than 455 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:142 state:D stack:0 pid:3581 tgid:3581 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0005d84 r8:00000002 r7:60000013 r6:e0005d8c r5:8412d400 r4:8412d400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8412d400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0005e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84975380 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8412d400 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848ed38c r4:848ed000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:848ed38c r4:84bd5e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8412d400 r8:84bd5eac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bd5e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd5e80 r8:8027ed34 r7:e0011e60 r6:84bd5f00 r5:8412d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0005fb0 to 0xe0005ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bceac0 INFO: task kworker/0:142:3581 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: cf0fe000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4 <> ags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: dd32e000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:193:4163 blocked for more than 472 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:193 state:D stack:0 pid:4163 tgid:4163 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab55d84 r8:00000002 r7:60000113 r6:eab55d8c r5:844d0c00 r4:844d0c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844d0c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab55e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8519b180 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:844d0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea881000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c378c r4:851c3400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c378c r4:851e5580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844d0c00 r8:851e55ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851e5580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e5580 r8:8027ed34 r7:eab35e60 r6:85198100 r5:844d0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab55fb0 to 0xeab55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8519b1c0 INFO: task kworker/1:193:4163 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: dd6a8000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:194:4165 blocked for more than 472 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:194 state:D stack:0 pid:4165 tgid:4165 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab5dd84 r8:00000002 r7:60000013 r6:eab5dd8c r5:844d0000 r4:844d0000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844d0000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab5de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8519b300 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:844d0000 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8b1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c3b8c r4:851c3800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c3b8c r4:851e5600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844d0000 r8:851e562c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851e5600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e5600 r8:8027ed34 r7:eab35e60 r6:85198180 r5:844d0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab5dfb0 to 0xeab5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8519b140 INFO: task kworker/1:194:4165 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: dd6a8000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:844d1800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab65e08 r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c4b8c r4:851e5680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844d1800 r8:851e56ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851e5680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e5680 r8:8027ed34 r7:eab35e60 r6:85198200 r5:844d1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab65fb0 to 0xeab65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8519b240 r4:dffd5dc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea913000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c438c r4:851c4000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c438c r4:851e5700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844d3000 r8:851e572c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:851e5700 r8:8027ed34 r7:eab65e60 r6:85198280 r5:844d3000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: Exception stack(0xdffd5d20 to 0xdffd5d68) r4:dffd5dc0 r4:00000000 r5:84bb0b8c r4:84bb0800 r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:84b85b00 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab1de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8519ea80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:844d3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea905000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515bf8c r4:8515bc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8515bf8c r4:85198300 r10:61c88647 r9:844d3c00 r8:8519832c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:85198300 r8:8027ed34 r7:ea9a1e60 r6:85198380 r5:844d3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab1dfb0 to 0xeab1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8519ea00 INFO: task kworker/0:331:4172 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: de954000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:332:4173 blocked for more than 472 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:332 state:D stack:0 pid:4173 tgid:4173 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab61d84 r8:00000002 r7:60000113 r6:eab61d8c r5:844d4800 r4:844d4800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844d4800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab61e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85260f8c r4:85198400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844d4800 r8:8519842c r7:82804d40 r6:dddced40 r5:dddced60 r4:85198400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85198400 r8:8027ed34 r7:ea9a1e60 r6:85198480 r5:844d4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab61fb0 to 0xeab61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8519ea00 INFO: task kworker/0:332:4173 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: dede6000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:197:4175 blocked for more than 472 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:197 state:D stack:0 pid:4175 tgid:4175 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab71d84 r8:00000002 r7:60000113 r6:eab71d8c r5:844d6000 r4:844d6000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844d6000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab71e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8519b740 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:844d6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea921000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c478c r4:851c4400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c478c r4:851e5780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844d6000 r8:851e57ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851e5780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e5780 r8:8027ed34 r7:eab65e60 r6:85198500 r5:844d6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab71fb0 to 0xeab71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8519b640 INFO: task kworker/1:197:4175 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: df02e000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:198:4178 blocked for more than 472 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:198 state:D stack:0 pid:4178 tgid:4178 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab7dd84 r8:00000002 r7:60000113 r6:eab7dd8c r5:844d2400 r4:844d2400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844d2400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab7de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8519bd00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:844d2400 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9a3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c578c r4:851c5400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c578c r4:851e5800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844d2400 r8:851e582c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851e5800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e5800 r8:8027ed34 r7:eab65e60 r6:85198580 r5:844d2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8519b900 INFO: task kworker/1:198:4178 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: df14c000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:199:4179 blocked for more than 472 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:199 state:D stack:0 pid:4179 tgid:4179 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab81d84 r8:00000002 r7:60000113 r6:eab81d8c r5:844d6c00 r4:844d6c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844d6c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab81e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8519b940 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea939000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c4f8c r4:851c4c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c4f8c r4:851e5880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844d6c00 r8:851e58ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851e5880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e5880 r8:8027ed34 r7:eab7de60 r6:85198600 r5:844d6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab81fb0 to 0xeab81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8519ba80 INFO: task kworker/1:199:4179 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: df67c000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:200:4181 blocked for more than 472 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:200 state:D stack:0 pid:4181 tgid:4181 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab89d84 r8:00000002 r7:60000113 r6:eab89d8c r5:844d5400 r4:844d5400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844d5400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab89e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8519bac0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:844d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea95f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c538c r4:851c5000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c538c r4:851e5980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844d5400 r8:851e59ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851e5980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e5980 r8:8027ed34 r7:eab7de60 r6:85198680 r5:844d5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab89fb0 to 0xeab89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8519b980 INFO: task kworker/1:200:4181 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: e11af000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:333:4184 blocked for more than 472 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:333 state:D stack:0 pid:4184 tgid:4184 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab15d84 r8:00000002 r7:60000113 r6:eab15d8c r5:849b0000 r4:849b0000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849b0000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab15e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518ad80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:849b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e882b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85260b8c r4:85260800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85260b8c r4:85198700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b0000 r8:8519872c r7:82804d40 r6:dddced40 r5:dddced60 r4:85198700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85198700 r8:8027ed34 r7:eab61e60 r6:85198780 r5:849b0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab15fb0 to 0xeab15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8519e1c0 INFO: task kworker/0:333:4184 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: e213e000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:201:4186 blocked for more than 472 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:201 state:D stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab8dd84 r8:00000002 r7:60000113 r6:eab8dd8c r5:849b0c00 r4:849b0c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849b0c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab8de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8519bdc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:849b0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9ed000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c5b8c r4:851c5800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c5b8c r4:851e5900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b0c00 r8:851e592c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851e5900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e5900 r8:8027ed34 r7:eab7de60 r6:85198800 r5:849b0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab8dfb0 to 0xeab8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8519ba40 INFO: task kworker/1:201:4186 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: e2607000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:202:4187 blocked for more than 472 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:202 state:D stack:0 pid:4187 tgid:4187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab91d84 r8:00000002 r7:60000113 r6:eab91d8c r5:849b1800 r4:849b1800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849b1800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab91e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8519bfc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:849b1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb0f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c5f8c r4:851c5c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c5f8c r4:851e5a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b1800 r8:851e5a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851e5a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e5a00 r8:8027ed34 r7:eab8de60 r6:85198880 r5:849b1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab91fb0 to 0xeab91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8519be00 INFO: task kworker/1:202:4187 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:203:4188 blocked for more than 472 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:203 state:D stack:0 pid:4188 tgid:4188 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab95d84 r8:00000002 r7:60000013 r6:eab95d8c r5:849b2400 r4:849b2400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849b2400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab95e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85227780 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:849b2400 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbbf000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:204:4192 blocked for more than 472 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:204 state:D stack:0 pid:4192 tgid:4192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaba1d84 r8:00000002 r7:60000013 r6:eaba1d8c r5:849b4800 r4:849b4800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849b4800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaba1e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:851e5b00 r8:8027ed34 r7:eab95e60 r6:85198980 r5:849b4800 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:82abf1e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:205:4193 blocked for more than 472 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:205 state:D stack:0 pid:4193 tgid:4193 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab85d84 r8:00000002 r7:60000113 r6:eab85d8c r5:84a3ec00 r4:84a3ec00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a3ec00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab85e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85194040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc59000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c678c r4:851c6400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c678c r4:851e5b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:851e5bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851e5b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e5b80 r8:8027ed34 r7:eaba1e60 r6:851e5c00 r5:84a3ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab85fb0 to 0xeab85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d20: e3d8c000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84be0e00 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab9de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85194280 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84a3d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0019000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c6f8c r4:851c6c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84a3d400 r8:851e5cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851e5c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e5c80 r8:8027ed34 r7:eaba1e60 r6:851e5d80 r5:84a3d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab9dfb0 to 0xeab9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred Exception stack(0xdffd5d20 to 0xdffd5d68) [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:207:4197 blocked for more than 472 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:207 state:D stack:0 pid:4197 tgid:4197 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab6dd84 r8:00000002 r7:60000113 r6:eab6dd8c r5:84a3bc00 r4:84a3bc00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a3bc00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab6de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85194500 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84a3bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c738c r4:851c7000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c738c r4:851e5d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3bc00 r8:851e5d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851e5d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:208:4201 blocked for more than 473 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:208 state:D stack:0 pid:4201 tgid:4201 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaba9d84 r8:00000002 r7:60000013 r6:eaba9d8c r5:84a3e000 r4:84a3e000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a3e000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaba9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85194600 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00a9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c778c r4:851c7400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c778c r4:851e5e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:851e5eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851e5e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e5e80 r8:8027ed34 r7:eab6de60 r6:851e5f00 r5:84a3e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaba9fb0 to 0xeaba9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85194440 INFO: task kworker/1:208:4201 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: e45a6000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:209:4202 blocked for more than 473 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:209 state:D stack:0 pid:4202 tgid:4202 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabb9e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:851c7b8c r4:851c7800 r4:851e5f80 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84b85b00 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eabb1d84 r8:00000002 r7:60000013 r6:eabb1d8c r5:84a29800 r4:84a29800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a29800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabb1e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85194a80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84a29800 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e045f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851cc38c r4:851cc000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851cc38c r4:85183000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a29800 r8:8518302c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85183000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85183000 r8:8027ed34 r7:eabb9e60 r6:85183080 r5:84a29800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabb1fb0 to 0xeabb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85194780 INFO: task kworker/1:210:4205 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: e74bc000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:211:4206 blocked for more than 473 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:211 state:D stack:0 pid:4206 tgid:4206 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eabbdd84 r8:00000002 r7:60000113 r6:eabbdd8c r5:85200000 r4:85200000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85200000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabbde08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851948c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85200000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0429000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c7f8c r4:851c7c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c7f8c r4:85183100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85200000 r8:8518312c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85183100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85183100 r8:8027ed34 r7:eabb1e60 r6:85183180 r5:85200000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabbdfb0 to 0xeabbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85194780 INFO: task kworker/1:211:4206 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: e74f9000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:212:4208 blocked for more than 473 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:212 state:D stack:0 pid:4208 tgid:4208 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eabc1d84 r8:00000002 r7:60000113 r6:eabc1d8c r5:85200c00 r4:85200c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85200c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabc1e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85194d40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85200c00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04b1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851ccb8c r4:851cc800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851ccb8c r4:85183200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85200c00 r8:8518322c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85183200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85183200 r8:8027ed34 r7:eabb1e60 r6:85183280 r5:85200c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabc1fb0 to 0xeabc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r5:80070113 r4:80239bd0 r4:dffd5dc0 r4:00000000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85194b40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85201800 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e048b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851cc78c r4:851cc400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851cc78c r4:85183300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85201800 r8:8518332c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85183300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85183300 r8:8027ed34 r7:eabc1e60 r6:85183380 r5:85201800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabc5fb0 to 0xeabc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85194b80 INFO: task kworker/1:213:4210 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: e79d8000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:214:4211 blocked for more than 473 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:214 state:D stack:0 pid:4211 tgid:4211 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eabadd84 r8:00000002 r7:60000013 r6:eabadd8c r5:85203000 r4:85203000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85203000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabade08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85175040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85203000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05c5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851cd38c r4:851cd000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851cd38c r4:85183400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85203000 r8:8518342c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85183400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85183400 r8:8027ed34 r7:eabc1e60 r6:85183480 r5:85203000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabadfb0 to 0xeabadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85194b80 INFO: task kworker/1:214:4211 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: e7dac000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:215:4213 blocked for more than 473 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:215 state:D stack:0 pid:4213 tgid:4213 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eabcdd84 r8:00000002 r7:60000013 r6:eabcdd8c r5:85203c00 r4:85203c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85203c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabcde08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85092cc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85203c00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0583000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851ccf8c r4:851ccc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851ccf8c r4:85183500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85203c00 r8:8518352c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85183500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85183500 r8:8027ed34 r7:eabade60 r6:85183580 r5:85203c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabcdfb0 to 0xeabcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85194b80 INFO: task kworker/1:215:4213 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: e7edc000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:216:4216 blocked for more than 473 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:216 state:D stack:0 pid:4216 tgid:4216 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eabc9d84 r8:00000002 r7:60000013 r6:eabc9d8c r5:85204800 r4:85204800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85204800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabc9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85175140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85204800 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0609000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851cd78c r4:851cd400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851cd78c r4:85183600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85204800 r8:8518362c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85183600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85183600 r8:8027ed34 r7:eabade60 r6:85183680 r5:85204800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabc9fb0 to 0xeabc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85175280 INFO: task kworker/1:216:4216 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: e89c5000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:217:4218 blocked for more than 473 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:217 state:D stack:0 pid:4218 tgid:4218 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eabd5d84 r8:00000002 r7:60000013 r6:eabd5d8c r5:85205400 r4:85205400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85205400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabd5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85175300 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85205400 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0643000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851cdb8c r4:851cd800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851cdb8c r4:85183700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85205400 r8:8518372c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85183700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85183700 r8:8027ed34 r7:eabc9e60 r6:85183780 r5:85205400 5fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85175100 INFO: task kworker/1:217:4218 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: e8f92000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:218:4220 blocked for more than 473 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabd1e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85175540 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85206c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e065b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851cdf8c r4:851cdc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851cdf8c r4:85183800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85206c00 r8:8518382c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85183800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85183800 r8:8027ed34 r7:eabd5e60 r6:85183880 r5:85206c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabd1fb0 to 0xeabd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851752c0 INFO: task kworker/1:218:4220 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: e8fbd000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:219:4221 blocked for more than 473 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:219 state:D stack:0 pid:4221 tgid:4221 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eabddd84 r8:00000002 r7:60000113 r6:eabddd8c r5:849b5400 r4:849b5400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849b5400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabdde08 r4:00000000 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85183900 r8:8027ed34 r7:eabd1e60 r6:85198a80 r5:849b5400 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85175500 INFO: task kworker/1:219:4221 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: ea19a000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:220:4223 blocked for more than 473 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:220 state:D stack:0 pid:4223 tgid:4223 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eabe1d84 r8:00000002 r7:60000113 r6:eabe1d8c r5:85206000 r4:85206000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85206000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabe1e08 r4:00000000 [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851ce78c r4:851ce400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851ce78c r4:85183980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85206000 r8:851839ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85183980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85183980 r8:8027ed34 r7:eabdde60 r6:85183a00 r5:85206000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabe1fb0 to 0xeabe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85175100 INFO: task kworker/1:220:4223 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: ec5c5000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:334:4227 blocked for more than 473 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:334 state:D stack:0 pid:4227 tgid:4227 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eabd9d84 r8:00000002 r7:60000113 r6:eabd9d8c r5:849b6c00 r4:849b6c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849b6c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabd9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851759c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:849b6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851ce38c r4:851ce000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851ce38c r4:85198b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b6c00 r8:85198b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85198b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85198b00 r8:8027ed34 r7:eab61e60 r6:85198b80 r5:849b6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabd9fb0 to 0xeabd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518ae80 INFO: task kworker/0:334:4227 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: ed4cb000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:335:4228 blocked for more than 473 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:335 state:D stack:0 pid:4228 tgid:4228 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eabe5d84 r8:00000002 r7:60000013 r6:eabe5d8c r5:849b6000 r4:849b6000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849b6000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabe5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516aa00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:849b6000 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa3f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85261b8c r4:85261800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85261b8c r4:85198c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b6000 r8:85198c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85198c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85198c00 r8:8027ed34 r7:eabd9e60 r6:85198c80 r5:849b6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabe5fb0 to 0xeabe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518ae80 INFO: task kworker/0:335:4228 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: eda24000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:336:4230 blocked for more than 473 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:336 state:D stack:0 pid:4230 tgid:4230 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eabedd84 r8:00000002 r7:60000113 r6:eabedd8c r5:849b3c00 r4:849b3c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849b3c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabede08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516a780 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:849b3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa27000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526138c r4:85261000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8526138c r4:85198d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b3c00 r8:85198d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85198d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85198d00 r8:8027ed34 r7:eabe5e60 r6:85198d80 r5:849b3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabedfb0 to 0xeabedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518ae80 INFO: task kworker/0:336:4230 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: edd12000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:829185c4 r9:eabf9d84 r8:00000002 r7:60000113 r6:eabf9d8c r5:84728c00 [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85175c80 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85175dc0 INFO: task kworker/1:221:4232 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 7f87f000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 90070113 ffffffff r5:90070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:222:4235 blocked for more than 474 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:222 state:D stack:0 pid:4235 tgid:4235 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac05d84 r8:00000002 r7:60000013 r6:eac05d8c r5:8472a400 r4:8472a400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851cf38c r4:851cf000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851cf38c r4:85183a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8472a400 r8:85183aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85183a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85183a80 r8:8027ed34 r7:eabf9e60 r6:85198e80 r5:8472a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac05fb0 to 0xeac05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85175d40 INFO: task kworker/1:222:4235 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 7f87f000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 90070113 ffffffff r5:90070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:223:4236 blocked for more than 474 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:223 state:D stack:0 pid:4236 tgid:4236 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac09d84 r8:00000002 r7:60000113 r6:eac09d8c r5:8472b000 r4:8472b000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8472b000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac09e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b78c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8472b000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851d938c r4:851d9000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851d938c r4:85183b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8472b000 r8:85183bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85183b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85183b80 r8:8027ed34 r7:eac05e60 r6:85198f00 r5:8472b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac09fb0 to 0xeac09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85175d40 INFO: task kworker/1:223:4236 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 81758000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 r4:82abf1e4 r4:dffd5dc0 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:224:4238 blocked for more than 474 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:224 state:D stack:0 pid:4238 tgid:4238 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac11d84 r8:00000002 r7:60000013 r6:eac11d8c r5:84728000 r4:84728000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84728000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac11e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:225:4240 blocked for more than 474 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:225 state:D stack:0 pid:4240 tgid:4240 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac19d84 r8:00000002 r7:60000113 r6:eac19d8c r5:84729800 r4:84729800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84729800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac19e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518a880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84729800 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9e9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851cfb8c r4:851cf800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851cfb8c r4:85183c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84729800 r8:85183cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85183c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85183c80 r8:8027ed34 r7:eac09e60 r6:850af000 r5:84729800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac19fb0 to 0xeac19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518a2c0 INFO: task kworker/1:225:4240 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 82b9d000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84be0e00 5fa0: 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc2-syzkaller #0 r10:829185c4 r9:eac21d84 r8:00000002 r7:60000113 r6:eac21d8c r5:8472bc00 [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac21e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b7040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:82abf1e4 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:227:4244 blocked for more than 474 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:227 state:D stack:0 pid:4244 tgid:4244 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:8472c800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8472c800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac29e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b71c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8472c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa01000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851d838c r4:851d8000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851d838c r4:85183d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8472c800 r8:85183dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85183d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85183d80 r8:8027ed34 r7:eac09e60 r6:850af100 r5:8472c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac29fb0 to 0xeac29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850b7140 INFO: task kworker/1:227:4244 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 830d3000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:228:4246 blocked for more than 474 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:829185c4 r9:eac31d84 r8:00000002 r7:60000113 r6:eac31d8c r5:8472ec00 [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b72c0 [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac35e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b7740 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8472d400 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd4b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851d8b8c r4:851d8800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851d8b8c r4:85183e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8472d400 r8:85183eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85183e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85183e80 r8:8027ed34 r7:eac09e60 r6:850af200 r5:8472d400 task:kworker/0:337 state:D stack:0 pid:4250 tgid:4250 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeabf1fb0 to 0xeabf1ff8) r4:8516a740 Workqueue: events bpf_prog_free_deferred r4:82abf1e4 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:338:4252 blocked for more than 474 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:338 state:D stack:0 pid:4252 tgid:4252 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac2dd84 r8:00000002 r7:60000113 r6:eac2dd8c r5:84a08000 r4:84a08000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a08000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac2de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:82abf1e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 5fa0: 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:8520a400 [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab59e08 [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018205 r8:8520a400 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 r7:ddde2d40 r6:83018200 r5:851d8f8c r4:85183f00 r10:00000000 r9:85183f00 r8:8027ed34 r7:eac09e60 r6:85183f80 r5:8520a400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:339:4259 blocked for more than 474 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:339 state:D stack:0 pid:4259 tgid:4259 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac39d84 r8:00000002 r7:60000113 r6:eac39d8c r5:85209800 r4:85209800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85209800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac39e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508e640 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85209800 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea983000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85262b8c r4:85262800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85262b8c r4:850af480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85209800 r8:850af4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:850af480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850af480 r8:8027ed34 r7:eac2de60 r6:850b1000 r5:85209800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac39fb0 to 0xeac39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8516ad40 INFO: task kworker/0:339:4259 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 851e0000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:340:4260 blocked for more than 474 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:340 state:D stack:0 pid:4260 tgid:4260 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eabf5d84 r8:00000002 r7:60000113 r6:eabf5d8c r5:8520b000 r4:8520b000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8520b000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabf5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508e540 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8520b000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea941000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526278c r4:85262400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8526278c r4:850af500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8520b000 r8:850af52c r7:82804d40 r6:dddced40 r5:dddced60 r4:850af500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850af500 r8:8027ed34 r7:eac39e60 r6:850b1080 r5:8520b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabf5fb0 to 0xeabf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8516ad40 INFO: task kworker/0:340:4260 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 851e0000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:231:4262 blocked for more than 474 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:231 state:D stack:0 pid:4262 tgid:4262 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac3dd84 r8:00000002 r7:60000113 r6:eac3dd8c r5:8520bc00 r4:8520bc00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8520bc00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac3de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b7d00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8520bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04cf000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851d9b8c r4:851d9800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851d9b8c r4:850b1100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8520bc00 r8:850b112c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850b1100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b1100 r8:8027ed34 r7:eac09e60 r6:850b1180 r5:8520bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac3dfb0 to 0xeac3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850b7900 INFO: task kworker/1:231:4262 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 5fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:232 state:D stack:0 pid:4264 tgid:4264 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab75d84 r8:00000002 r7:60000013 r6:eab75d8c r5:8520c800 r4:8520c800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8520c800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab75e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b7c40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8520c800 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 Exception stack(0xeac41fb0 to 0xeac41ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850b7e00 INFO: task kworker/1:233:4266 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 857b6000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r5:85e0df8c r4:85e0dc00 r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac45d84 r8:00000002 r7:60000113 r6:eac45d8c r5:8520e000 r4:8520e000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8520e000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac45e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b7540 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8520e000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05c1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851da38c r4:851da000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851da38c r4:850b1400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8520e000 r8:850b142c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850b1400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b1400 r8:8027ed34 r7:eac41e60 r6:850b1480 r5:8520e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac45fb0 to 0xeac45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850b7f00 INFO: task kworker/1:234:4268 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 85bd9000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:829185c4 r9:eac49d84 r8:00000002 r7:60000113 r6:eac49d8c r5:8520ec00 r4:8520ec00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8520ec00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac49e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xeac49fb0 to 0xeac49ff8) r4:850b7f00 r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:82abf1e4 r4:dffd5dc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:236:4272 blocked for more than 475 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:236 state:D stack:0 pid:4272 tgid:4272 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac4dd84 r8:00000002 r7:60000013 r6:eac4dd8c r5:85208000 r4:85208000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac4de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851757c0 r4:00000000 r5:00001000 r4:e0669000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:80070113 r4:80239bd0 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:237:4274 blocked for more than 475 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:237 state:D stack:0 pid:4274 tgid:4274 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:ddde2d40 r6:83018200 r5:851dab8c r4:850b1700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85208c00 r8:850b172c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850b1700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b1700 r8:8027ed34 r7:eac49e60 r6:850b1780 r5:85208c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac51fb0 to 0xeac51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850a6280 INFO: task kworker/1:237:4274 is blocked on a mutex likely owned by task kworker/1:86:3549. [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:851daf8c r4:850b1800 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:85e0df8c r4:85e0dc00 r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:239:4278 blocked for more than 475 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:239 state:D stack:0 pid:4278 tgid:4278 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac59d84 r8:00000002 r7:60000013 r6:eac59d8c r5:85210000 r4:85210000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85210000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac59e08 r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:85210000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:850b1900 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850a6340 INFO: task kworker/1:239:4278 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 87667000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:240:4280 blocked for more than 475 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:240 state:D stack:0 pid:4280 tgid:4280 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac5dd84 r8:00000002 r7:60000013 r6:eac5dd8c r5:85210c00 r4:85210c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85210c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac5de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a6600 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85210c00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47b7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851dbb8c r4:851db800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851dbb8c r4:850b1a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85210c00 r8:850b1a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850b1a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b1a00 r8:8027ed34 r7:eac49e60 r6:850b1a80 r5:85210c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac5dfb0 to 0xeac5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850a6400 INFO: task kworker/1:240:4280 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 87ee2000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:241:4282 blocked for more than 475 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:241 state:D stack:0 pid:4282 tgid:4282 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac61d84 r8:00000002 r7:60000113 r6:eac61d8c r5:85211800 r4:85211800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r9:83018205 r8:85211800 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fa0: 00000000 00000000 00000000 00000000 r4:850a6540 INFO: task kworker/1:241:4282 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 884f7000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:242:4283 blocked for more than 475 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:242 state:D stack:0 pid:4283 tgid:4283 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac65d84 r8:00000002 r7:60000113 r6:eac65d8c r5:85212400 r4:85212400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85212400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac65e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a6780 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85212400 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 889e4000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:243:4287 blocked for more than 475 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:243 state:D stack:0 pid:4287 tgid:4287 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac69d84 r8:00000002 r7:60000113 r6:eac69d8c r5:85213000 r4:85213000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85213000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac69e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a6940 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85213000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8b7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8529838c r4:85298000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8529838c r4:850b1d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85213000 r8:850b1d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850b1d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b1d00 r8:8027ed34 r7:eac61e60 r6:850b1d80 r5:85213000 r4:00000001 Exception stack(0xeac69fb0 to 0xeac69ff8) r4:850a6900 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 88b59000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:244:4288 blocked for more than 475 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:244 state:D stack:0 pid:4288 tgid:4288 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac71d84 r8:00000002 r7:60000113 r6:eac71d8c r5:85213c00 r4:85213c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85213c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac71e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a6a00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85213c00 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8ed000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8529878c r4:85298400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8529878c r4:850b1e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85213c00 r8:850b1e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850b1e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b1e00 r8:8027ed34 r7:eac61e60 r6:850b1e80 r5:85213c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac71fb0 to 0xeac71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850a6d00 INFO: task kworker/1:244:4288 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 88d66000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:245:4289 blocked for more than 475 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:245 state:D stack:0 pid:4289 tgid:4289 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac79d84 r8:00000002 r7:60000113 r6:eac79d8c r5:85214800 r4:85214800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85214800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac79e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a6b40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea90b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85298b8c r4:85298800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85298b8c r4:850b1f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:850b1f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850b1f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b1f00 r8:8027ed34 r7:eac61e60 r6:850b1f80 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac79fb0 to 0xeac79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850a6d00 INFO: task kworker/1:245:4289 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 88e26000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 r5:00001000 r4:ecb2b000 r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 r4:00000001 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:246:4292 blocked for more than 475 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:246 state:D stack:0 pid:4292 tgid:4292 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac75d84 r8:00000002 r7:60000113 r6:eac75d8c r5:85215400 r4:85215400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85215400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac75e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a6e80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85215400 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea91f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85298f8c r4:85298c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85298f8c r4:8508a000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85215400 r8:8508a02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8508a000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508a000 r8:8027ed34 r7:eac61e60 r6:8508a080 r5:85215400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac75fb0 to 0xeac75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850a6e40 INFO: task kworker/1:246:4292 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 892af000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 r5:00001000 r4:ecb2b000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:247 state:D stack:0 pid:4293 tgid:4293 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:829185c4 r9:eac7dd84 r8:00000002 r7:60000013 r6:eac7dd8c r5:85216c00 r4:85216c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85216c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac7de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516af00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85216c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea931000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8529938c r4:85299000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8529938c r4:8508a100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216c00 r8:8508a12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8508a100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508a100 r8:8027ed34 r7:eac61e60 r6:8508a180 r5:85216c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac7dfb0 to 0xeac7dff8) dfa0: 00000000 00000000 00000000 00000000 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r5:85218000 r4:829185c0 [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 INFO: task kworker/0:341:4297 blocked for more than 475 seconds. r4:85219800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85219800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac8de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84977bc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85219800 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 r7:dddced40 r6:83018000 r5:848b678c r4:850af580 Exception stack(0xeac8dfb0 to 0xeac8dff8) task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 5d60: 80070113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xdffd5fb0 to 0xdffd5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:342:4300 blocked for more than 475 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:342 state:D stack:0 pid:4300 tgid:4300 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac91d84 r8:00000002 r7:60000113 r6:eac91d8c r5:85218c00 r4:85218c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85218c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac91e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508e3c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85218c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85262f8c r4:85262c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85262f8c r4:850af600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85218c00 r8:850af62c r7:82804d40 r6:dddced40 r5:dddced60 r4:850af600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850af600 r8:8027ed34 r7:eac8de60 r6:8508a380 r5:85218c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac91fb0 to 0xeac91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508e740 INFO: task kworker/0:342:4300 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8a66e000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac81d84 r8:00000002 r7:60000113 r6:eac81d8c r5:8521b000 r4:8521b000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8521b000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac81e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85088540 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8521b000 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa89000 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeac81fb0 to 0xeac81ff8) 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:250:4303 blocked for more than 475 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:250 state:D stack:0 pid:4303 tgid:4303 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac89d84 r8:00000002 r7:60000113 r6:eac89d8c r5:8521bc00 r4:8521bc00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8521bc00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac89e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850886c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8521bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa97000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85299f8c r4:85299c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85299f8c r4:8508a500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8521bc00 r8:8508a52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8508a500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508a500 r8:8027ed34 r7:eac85e60 r6:8508a580 r5:8521bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac89fb0 to 0xeac89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85088800 INFO: task kworker/1:250:4303 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8a832000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:251:4306 blocked for more than 475 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:251 state:D stack:0 pid:4306 tgid:4306 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac95d84 r8:00000002 r7:60000113 r6:eac95d8c r5:8521c800 r4:8521c800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8521c800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac95e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85088d00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8521c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaafb000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8529af8c r4:8529ac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8529af8c r4:8508a600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8521c800 r8:8508a62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8508a600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508a600 r8:8027ed34 r7:eac85e60 r6:8508a680 r5:8521c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac95fb0 to 0xeac95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85088780 INFO: task kworker/1:251:4306 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8aab1000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:252:4308 blocked for more than 475 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:252 state:D stack:0 pid:4308 tgid:4308 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac99d84 r8:00000002 r7:60000113 r6:eac99d8c r5:8521d400 r5:8521d400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac99e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850889c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8521d400 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaadf000 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8508a700 r8:8027ed34 r7:eac95e60 r6:8508a780 r5:8521d400 r4:85088900 r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829185c4 r9:eaca1d84 r8:00000002 r7:60000113 r6:eaca1d8c r5:8521e000 r5:8521e000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaca1e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85088c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8521e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaed000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8529ab8c r4:8529a800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8529ab8c r4:8508a800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8521e000 r8:8508a82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8508a800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508a800 r8:8027ed34 r7:eac95e60 r6:8508a880 r5:8521e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaca1fb0 to 0xeaca1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85088ac0 INFO: task kworker/1:253:4309 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) r5:80070113 r4:80239bd0 r4:00000000 r5:00001000 r4:ecb2b000 r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:254:4312 blocked for more than 476 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:254 state:D stack:0 pid:4312 tgid:4312 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac9dd84 r8:00000002 r7:60000113 r6:eac9dd8c r5:8521ec00 r4:8521ec00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8521ec00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac9de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85088f00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8521ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab05000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8529b38c r4:8529b000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8529b38c r4:8508a900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8521ec00 r8:8508a92c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8508a900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508a900 r8:8027ed34 r7:eac95e60 r6:8508a980 r5:8521ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac9dfb0 to 0xeac9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8cc2c000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:255 state:D stack:0 pid:4313 tgid:4313 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8508aa00 r8:8027ed34 r7:eac9de60 r6:850af680 r5:84a08c00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85088ac0 INFO: task kworker/1:255:4313 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8cd72000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf0340 r9:83018205 r8:84a09800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab4f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8529bf8c r4:8529bc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8529bf8c r4:8508aa80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a09800 r8:8508aaac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8508aa80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508aa80 r8:8027ed34 r7:eacade60 r6:850af700 r5:84a09800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacb9fb0 to 0xeacb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf01c0 INFO: task kworker/1:256:4316 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8d5c1000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:dffd5dc0 r4:00000000 r5:00001000 r4:ecb2b000 r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:257 state:D stack:0 pid:4317 tgid:4317 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018205 r8:84a0bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 r7:ddde2d40 r6:83018200 r5:8529bb8c r4:8508ab00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508ab00 r8:8027ed34 r7:eacb9e60 r6:850af780 r5:84a0bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacbdfb0 to 0xeacbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf01c0 INFO: task kworker/1:257:4317 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8e0bf000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:258:4319 blocked for more than 476 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:258 state:D stack:0 pid:4319 tgid:4319 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eacc5d84 r8:00000002 r7:60000113 r6:eacc5d8c r5:84a0b000 r4:84a0b000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a0b000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacc5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf0500 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r5:00001000 r4:eacdd000 r7:ddde2d40 r6:83018200 r5:852a078c r4:8508ab80 Exception stack(0xeacc5fb0 to 0xeacc5ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84bf0100 INFO: task kworker/1:258:4319 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8e64a000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r4:84a0c800 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaccde08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf03c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84a0c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacd7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a038c r4:852a0000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852a038c r4:8508ac00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a0c800 r8:8508ac2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8508ac00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508ac00 r8:8027ed34 r7:eacc5e60 r6:850af880 r5:84a0c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaccdfb0 to 0xeaccdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf0300 INFO: task kworker/1:259:4321 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8ea6d000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:343:4323 blocked for more than 476 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:343 state:D stack:0 pid:4323 tgid:4323 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eacd5d84 r8:00000002 r7:60000113 r6:eacd5d8c r5:84a0d400 r4:84a0d400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a0d400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacd5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84977b40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a0d400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04bf000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85263f8c r4:85263c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85263f8c r4:850af900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a0d400 r8:850af92c r7:82804d40 r6:dddced40 r5:dddced60 r4:850af900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850af900 r8:8027ed34 r7:eac8de60 r6:850af980 r5:84a0d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacd5fb0 to 0xeacd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508ea00 INFO: task kworker/0:343:4323 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8ea6d000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 r5:00001000 r4:ecb2b000 r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:260:4325 blocked for more than 476 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:260 state:D stack:0 pid:4325 tgid:4325 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eacf1d84 r8:00000002 r7:60000113 r6:eacf1d8c r5:84a0e000 r4:84a0e000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a0e000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacf1e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf0d00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84a0e000 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa1b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a1f8c r4:852a1c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852a1f8c r4:8508ac80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a0e000 r8:8508acac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8508ac80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508ac80 r8:8027ed34 r7:eacc5e60 r6:850afa00 r5:84a0e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacf1fb0 to 0xeacf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf0400 INFO: task kworker/1:260:4325 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8ee47000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r5:00001000 r4:ecb2b000 r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:261:4327 blocked for more than 476 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:261 state:D stack:0 pid:4327 tgid:4327 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eacf9d84 r8:00000002 r7:60000113 r6:eacf9d8c r5:84a0ec00 r4:84a0ec00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a0ec00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacf9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf0700 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84a0ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eace9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a0b8c r4:852a0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852a0b8c r4:8508ad00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a0ec00 r8:8508ad2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8508ad00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508ad00 r8:8027ed34 r7:eacf1e60 r6:850afa80 r5:84a0ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacf9fb0 to 0xeacf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf0540 INFO: task kworker/1:261:4327 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8f80e000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf0780 r7:ddde2d40 r6:83018200 r5:852a0f8c r4:8508ad80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf0540 INFO: task kworker/1:262:4329 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8fa11000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:263:4331 blocked for more than 476 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:263 state:D stack:0 pid:4331 tgid:4331 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ead1dd84 r8:00000002 r7:60000013 r6:ead1dd8c r5:844e0000 r4:844e0000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844e0000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead1de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf08c0 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a138c r4:852a1000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852a138c r4:8508ae00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844e0000 r8:8508ae2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8508ae00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508ae00 r8:8027ed34 r7:eacf1e60 r6:850afb80 r5:844e0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead1dfb0 to 0xead1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf0540 INFO: task kworker/1:263:4331 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8fa12000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:264:4333 blocked for more than 476 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:264 state:D stack:0 pid:4333 tgid:4333 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ead29d84 r8:00000002 r7:60000113 r6:ead29d8c r5:844e1800 r4:844e1800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844e1800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead29e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf0ac0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:844e1800 r7:00000000 r6:83018200 r5:00001000 r4:7f00f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead23000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a178c r4:852a1400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852a178c r4:8508ae80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844e1800 r8:8508aeac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8508ae80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508ae80 r8:8027ed34 r7:eacf1e60 r6:850afc00 r5:844e1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead29fb0 to 0xead29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf0900 INFO: task kworker/1:264:4333 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8ff76000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:265:4335 blocked for more than 476 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:265 state:D stack:0 pid:4335 tgid:4335 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaca9d84 r8:00000002 r7:60000113 r6:eaca9d8c r5:8521a400 r4:8521a400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8521a400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaca9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf0b40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8521a400 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9e7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a1b8c r4:852a1800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852a1b8c r4:8508af00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8521a400 r8:8508af2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8508af00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508af00 r8:8027ed34 r7:eacf1e60 r6:8508af80 r5:8521a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaca9fb0 to 0xeaca9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf0cc0 INFO: task kworker/1:265:4335 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8ff79000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:266:4338 blocked for more than 476 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:266 state:D stack:0 pid:4338 tgid:4338 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ead41d84 r8:00000002 r7:60000113 r6:ead41d8c r5:844e2400 r4:844e2400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844e2400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead41e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66000 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:844e2400 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a338c r4:852a3000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852a338c r4:84b7b000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844e2400 r8:84b7b02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b7b000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7b000 r8:8027ed34 r7:eacf1e60 r6:850afc80 r5:844e2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead41fb0 to 0xead41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf0c40 INFO: task kworker/1:266:4338 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 90261000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:267:4339 blocked for more than 476 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:267 state:D stack:0 pid:4339 tgid:4339 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ead55d84 r8:00000002 r7:60000113 r6:ead55d8c r5:844e3c00 r4:844e3c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844e3c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead55e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508eac0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:844e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb55000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a238c r4:852a2000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852a238c r4:84b7b080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844e3c00 r8:84b7b0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b7b080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7b080 r8:8027ed34 r7:ead41e60 r6:850afd00 r5:844e3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead55fb0 to 0xead55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf0c40 INFO: task kworker/1:267:4339 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 90768000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:268:4341 blocked for more than 476 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:268 state:D stack:0 pid:4341 tgid:4341 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ead5dd84 r8:00000002 r7:60000113 r6:ead5dd8c r5:844e5400 r4:844e5400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844e5400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead5de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf0e80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:844e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc57000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a278c r4:852a2400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852a278c r4:84b7b100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844e5400 r8:84b7b12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b7b100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7b100 r8:8027ed34 r7:ead41e60 r6:850afd80 r5:844e5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead5dfb0 to 0xead5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508ebc0 INFO: task kworker/1:268:4341 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 90768000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:269:4343 blocked for more than 476 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:269 state:D stack:0 pid:4343 tgid:4343 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ead65d84 r8:00000002 r7:60000013 r6:ead65d8c r5:844e4800 r4:844e4800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844e4800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead65e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85088f80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:844e4800 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff73000 r5:852a2b8c r4:852a2800 r10:00000000 r9:84b7b180 r8:8027ed34 r7:ead41e60 r6:850afe00 r5:844e4800 INFO: task kworker/1:269:4343 is blocked on a mutex likely owned by task kworker/1:86:3549. Exception stack(0xdffd5d20 to 0xdffd5d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:270:4345 blocked for more than 477 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:270 state:D stack:0 pid:4345 tgid:4345 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eabfdd84 r8:00000002 r7:60000013 r6:eabfdd8c r5:85216000 r4:85216000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85216000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabfde08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84895480 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85216000 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0043000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a2f8c r4:852a2c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852a2f8c r4:84b7b200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84b7b22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b7b200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7b200 r8:8027ed34 r7:ead41e60 r6:84b7b280 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabfdfb0 to 0xeabfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 92a16000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:271:4348 blocked for more than 477 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:271 state:D stack:0 pid:4348 tgid:4348 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ead79d84 r8:00000002 r7:60000113 r6:ead79d8c r5:852d8000 r4:852d8000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852d8000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead79e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b664c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:852d8000 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04a7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a3f8c r4:852a3c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852a3f8c r4:84b7b300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852d8000 r8:84b7b32c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:84b7b300 r8:8027ed34 r7:ead41e60 r6:84b7b380 r5:852d8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead79fb0 to 0xead79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaca5e08 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a378c r4:852a3400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852a378c r4:84b7b400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852d8c00 r8:84b7b42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b7b400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7b400 r8:8027ed34 r7:ead79e60 r6:84b7b480 r5:852d8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaca5fb0 to 0xeaca5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b660c0 INFO: task kworker/1:272:4349 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d60: 80070113 ffffffff r4:dffd5dc0 r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:273:4352 blocked for more than 477 seconds. r10:829185c4 r9:ead8dd84 r8:00000002 r7:60000113 r6:ead8dd8c r5:852d9800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead8de08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:852d9800 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0471000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a3b8c r4:852a3800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852a3b8c r4:84b7b500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852d9800 r8:84b7b52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b7b500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7b500 r8:8027ed34 r7:ead79e60 r6:84b7b580 r5:852d9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead8dfb0 to 0xead8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b662c0 INFO: task kworker/1:273:4352 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 94986000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 5fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:274:4354 blocked for more than 477 seconds. r10:829185c4 r9:ead95d84 r8:00000002 r7:60000013 r6:ead95d8c r5:852da400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead95e08 r4:00000000 [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r5:852a438c r4:852a4000 r10:61c88647 r9:852da400 r8:84b7b62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:274:4354 is blocked on a mutex likely owned by task kworker/1:86:3549. Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 95a2a000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:275:4356 blocked for more than 477 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:275 state:D stack:0 pid:4356 tgid:4356 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ead99d84 r8:00000002 r7:60000113 r6:ead99d8c r5:852db000 r4:852db000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852db000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead99e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd27c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:852db000 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e064b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526378c r4:85263400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8526378c r4:84b7b700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84b7b700 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:275:4356 is blocked on a mutex likely owned by task kworker/1:86:3549. r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 5d60: 80070113 ffffffff [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:276:4359 blocked for more than 477 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:276 state:D stack:0 pid:4359 tgid:4359 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eadb9d84 r8:00000002 r7:60000013 r6:eadb9d8c r5:852dbc00 r4:852dbc00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852dbc00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadb9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66940 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:852dbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8807000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a478c r4:852a4400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852a478c r4:84b7b800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852dbc00 r8:84b7b82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b7b800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7b800 r8:8027ed34 r7:ead99e60 r6:84b7b880 r5:852dbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadb9fb0 to 0xeadb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b66580 INFO: task kworker/1:276:4359 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 96a26000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:277:4361 blocked for more than 477 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:277 state:D stack:0 pid:4361 tgid:4361 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eadbdd84 r8:00000002 r7:60000013 r6:eadbdd8c r5:852de000 r4:852de000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852de000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadbde08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66b40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:852de000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8833000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a4b8c r4:852a4800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852a4b8c r4:84b7b900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852de000 r8:84b7b92c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b7b900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7b900 r8:8027ed34 r7:eadb9e60 r6:84b7b980 r5:852de000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadbdfb0 to 0xeadbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b66900 INFO: task kworker/1:277:4361 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 96d91000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:278:4363 blocked for more than 477 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:278 state:D stack:0 pid:4363 tgid:4363 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ead91d84 r8:00000002 r7:60000013 r6:ead91d8c r5:852dc800 r4:852dc800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852dc800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead91e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66c40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:852dc800 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a4f8c r4:852a4c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852a4f8c r4:84b7ba00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852dc800 r8:84b7ba2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b7ba00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7ba00 r8:8027ed34 r7:eadbde60 r6:84b7ba80 r5:852dc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead91fb0 to 0xead91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b66b00 INFO: task kworker/1:278:4363 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 972f2000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:279:4365 blocked for more than 477 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:279 state:D stack:0 pid:4365 tgid:4365 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eada5d84 r8:00000002 r7:60000013 r6:eada5d8c r5:852dec00 r4:852dec00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852dec00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eada5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66e00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:852dec00 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea895000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a538c r4:852a5000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852a538c r4:84b7bb00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xeada5fb0 to 0xeada5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b66bc0 INFO: task kworker/1:279:4365 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 978c3000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:280:4367 blocked for more than 477 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:280 state:D stack:0 pid:4367 tgid:4367 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eadc5d84 r8:00000002 r7:60000113 r6:eadc5d8c r5:852dd400 r4:852dd400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852dd400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadc5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b15000 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:852dd400 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9c9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a5b8c r4:852a5800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852a5b8c r4:84b7bc00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852dd400 r8:84b7bc2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b7bc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 80070113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.16.0-rc2-syzkaller #0 task:kworker/1:281 state:D stack:0 pid:4369 tgid:4369 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eadc9d84 r8:00000002 r7:60000113 r6:eadc9d8c r5:852e0000 r4:852e0000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852e0000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadc9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508ebc0 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84b7bd00 Exception stack(0xeadc9fb0 to 0xeadc9ff8) INFO: task kworker/1:281:4369 is blocked on a mutex likely owned by task kworker/1:86:3549. r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9888c000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:282:4370 blocked for more than 477 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:282 state:D stack:0 pid:4370 tgid:4370 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eadcdd84 r8:00000002 r7:60000113 r6:eadcdd8c r5:852e0c00 r4:852e0c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852e0c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadcde08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b15340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:852e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9fb000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a638c r4:852a6000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852a638c r4:84b7be00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852e0c00 r8:84b7be2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b7be00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7be00 r8:8027ed34 r7:eadc5e60 r6:84b7be80 r5:852e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadcdfb0 to 0xeadcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b15100 INFO: task kworker/1:282:4370 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 98cad000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:283:4373 blocked for more than 477 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:283 state:D stack:0 pid:4373 tgid:4373 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eadd1d84 r8:00000002 r7:60000113 r6:eadd1d8c r5:852e1800 r4:852e1800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852e1800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadd1e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b151c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:852e1800 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9dd000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a5f8c r4:852a5c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852a5f8c r4:84b7bf00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852e1800 r8:84b7bf2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b7bf00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7bf00 r8:8027ed34 r7:eadcde60 r6:84b7bf80 r5:852e1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadd1fb0 to 0xeadd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b15180 INFO: task kworker/1:283:4373 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9a0a1000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:284:4375 blocked for more than 477 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:284 state:D stack:0 pid:4375 tgid:4375 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eadd5d84 r8:00000002 r7:60000113 r6:eadd5d8c r5:852e2400 r4:852e2400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852e2400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadd5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b154c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:852e2400 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa0f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a678c r4:852a6400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852a678c r4:84b14000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852e2400 r8:84b1402c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b14000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b14000 r8:8027ed34 r7:eadcde60 r6:84b14080 r5:852e2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadd5fb0 to 0xeadd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b15280 INFO: task kworker/1:284:4375 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9b665000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:285:4377 blocked for more than 477 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:285 state:D stack:0 pid:4377 tgid:4377 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eadd9d84 r8:00000002 r7:60000113 r6:eadd9d8c r5:852e3000 r4:852e3000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852e3000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadd9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b15640 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:852e3000 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa29000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a6b8c r4:852a6800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852a6b8c r4:84b14100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852e3000 r8:84b1412c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b14100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b14100 r8:8027ed34 r7:eadd5e60 r6:84b14180 r5:852e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadd9fb0 to 0xeadd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b15400 INFO: task kworker/1:285:4377 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9bcb4000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:286:4379 blocked for more than 477 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:286 state:D stack:0 pid:4379 tgid:4379 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaddde08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b157c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:852e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa39000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a6f8c r4:852a6c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852a6f8c r4:84b14200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852e3c00 r8:84b1422c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b14200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b14200 r8:8027ed34 r7:eadd9e60 r6:84b14280 r5:852e3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadddfb0 to 0xeadddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b15580 INFO: task kworker/1:286:4379 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9c0b3000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400