INFO: task kworker/1:7:4001 blocked for more than 430 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:7 state:D stack:0 pid:4001 tgid:4001 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dfb95d84 r8:00000002 r7:60000113 r6:dfb95d8c r5:8389d400 r4:8389d400 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:8389d400 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb95e08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855d70c0 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8389d400 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd5000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855ae38c r4:855ae000 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855ae38c r4:85504500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8389d400 r8:8550452c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85504500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85504500 r8:8027ecf4 r7:dfb39e60 r6:85504580 r5:8389d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb95fb0 to 0xdfb95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85414180 INFO: task kworker/1:7:4001 is blocked on a mutex likely owned by task kworker/0:62:4441. task:kworker/0:62 state:R running task stack:0 pid:4441 tgid:4441 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:84920000 r8:80200be4 r7:dfefdd54 r6:ffffffff r5:84920000 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfefdd20 to 0xdfefdd68) dd20: 86ac6000 eb1ef000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 eb1ef000 8280c9b4 dfefdd9c dfefdda0 dfefdd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfefddc0 r5:dfefde08 r4:dfefddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c8640 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84920000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfccb000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855a2f8c r4:855a2c00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855a2f8c r4:855d3080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84920000 r8:855d30ac r7:82804d40 r6:dddced40 r5:dddced60 r4:855d3080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d3080 r8:8027ecf4 r7:dfd79e60 r6:855d3100 r5:84920000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfefdfb0 to 0xdfefdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855c8ec0 INFO: task kworker/1:9:4017 blocked for more than 430 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:9 state:D stack:0 pid:4017 tgid:4017 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dfbd9d84 r8:00000002 r7:60000113 r6:dfbd9d8c r5:84ea4800 r4:84ea4800 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:84ea4800 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd9e08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8541b700 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84ea4800 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa6f000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855aeb8c r4:855ae800 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855aeb8c r4:85504980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ea4800 r8:855049ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85504980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85504980 r8:8027ecf4 r7:dfb95e60 r6:84885e80 r5:84ea4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd9fb0 to 0xdfbd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84eefa40 INFO: task kworker/1:9:4017 is blocked on a mutex likely owned by task kworker/0:62:4441. task:kworker/0:62 state:R running task stack:0 pid:4441 tgid:4441 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:84920000 r8:80200be4 r7:dfefdd54 r6:ffffffff r5:84920000 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfefdd20 to 0xdfefdd68) dd20: 86ac6000 eb1ef000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 eb1ef000 8280c9b4 dfefdd9c dfefdda0 dfefdd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfefddc0 r5:dfefde08 r4:dfefddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c8640 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84920000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfccb000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855a2f8c r4:855a2c00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855a2f8c r4:855d3080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84920000 r8:855d30ac r7:82804d40 r6:dddced40 r5:dddced60 r4:855d3080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d3080 r8:8027ecf4 r7:dfd79e60 r6:855d3100 r5:84920000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfefdfb0 to 0xdfefdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855c8ec0 INFO: task kworker/1:10:4035 blocked for more than 430 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:10 state:D stack:0 pid:4035 tgid:4035 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dfd5dd84 r8:00000002 r7:60000113 r6:dfd5dd8c r5:848f3c00 r4:848f3c00 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:848f3c00 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd5de08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855cd100 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:848f3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd81000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855ac38c r4:855ac000 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855ac38c r4:85504b00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848f3c00 r8:85504b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85504b00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85504b00 r8:8027ecf4 r7:df9e1e60 r6:84e18080 r5:848f3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd5dfb0 to 0xdfd5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84880400 INFO: task kworker/1:10:4035 is blocked on a mutex likely owned by task kworker/0:62:4441. task:kworker/0:62 state:R running task stack:0 pid:4441 tgid:4441 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:84920000 r8:80200be4 r7:dfefdd54 r6:ffffffff r5:84920000 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfefdd20 to 0xdfefdd68) dd20: 86ac6000 eb1ef000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 eb1ef000 8280c9b4 dfefdd9c dfefdda0 dfefdd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfefddc0 r5:dfefde08 r4:dfefddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c8640 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84920000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfccb000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855a2f8c r4:855a2c00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855a2f8c r4:855d3080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84920000 r8:855d30ac r7:82804d40 r6:dddced40 r5:dddced60 r4:855d3080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d3080 r8:8027ecf4 r7:dfd79e60 r6:855d3100 r5:84920000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfefdfb0 to 0xdfefdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855c8ec0 INFO: task kworker/1:11:4036 blocked for more than 430 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:4036 tgid:4036 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dfcf5d84 r8:00000002 r7:60000113 r6:dfcf5d8c r5:84f33c00 r4:84f33c00 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:84f33c00 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcf5e08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848a6340 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84f33c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbcf000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84f8bf8c r4:84f8bc00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84f8bf8c r4:85504a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f33c00 r8:85504a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85504a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85504a00 r8:8027ecf4 r7:df9e1e60 r6:85504a80 r5:84f33c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcf5fb0 to 0xdfcf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84880bc0 INFO: task kworker/1:11:4036 is blocked on a mutex likely owned by task kworker/0:62:4441. task:kworker/0:62 state:R running task stack:0 pid:4441 tgid:4441 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:84920000 r8:80200be4 r7:dfefdd54 r6:ffffffff r5:84920000 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfefdd20 to 0xdfefdd68) dd20: 86ac6000 eb1ef000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 eb1ef000 8280c9b4 dfefdd9c dfefdda0 dfefdd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfefddc0 r5:dfefde08 r4:dfefddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c8640 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84920000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfccb000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855a2f8c r4:855a2c00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855a2f8c r4:855d3080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84920000 r8:855d30ac r7:82804d40 r6:dddced40 r5:dddced60 r4:855d3080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d3080 r8:8027ecf4 r7:dfd79e60 r6:855d3100 r5:84920000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfefdfb0 to 0xdfefdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855c8ec0 INFO: task kworker/1:12:4039 blocked for more than 430 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:12 state:D stack:0 pid:4039 tgid:4039 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dfb15d84 r8:00000002 r7:60000113 r6:dfb15d8c r5:84f30c00 r4:84f30c00 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:84f30c00 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb15e08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855d7740 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84f30c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff19000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855af38c r4:855af000 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855af38c r4:85504b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f30c00 r8:85504bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85504b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85504b80 r8:8027ecf4 r7:df9e1e60 r6:85504c00 r5:84f30c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb15fb0 to 0xdfb15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:848806c0 INFO: task kworker/1:12:4039 is blocked on a mutex likely owned by task kworker/0:62:4441. task:kworker/0:62 state:R running task stack:0 pid:4441 tgid:4441 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:84920000 r8:80200be4 r7:dfefdd54 r6:ffffffff r5:84920000 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfefdd20 to 0xdfefdd68) dd20: 86ac6000 eb1ef000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 eb1ef000 8280c9b4 dfefdd9c dfefdda0 dfefdd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfefddc0 r5:dfefde08 r4:dfefddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c8640 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84920000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfccb000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855a2f8c r4:855a2c00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855a2f8c r4:855d3080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84920000 r8:855d30ac r7:82804d40 r6:dddced40 r5:dddced60 r4:855d3080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d3080 r8:8027ecf4 r7:dfd79e60 r6:855d3100 r5:84920000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfefdfb0 to 0xdfefdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855c8ec0 INFO: task kworker/1:70:4327 blocked for more than 430 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:70 state:D stack:0 pid:4327 tgid:4327 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dfdd9d84 r8:00000002 r7:60000113 r6:dfdd9d8c r5:84b60c00 r4:84b60c00 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:84b60c00 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdd9e08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855cd4c0 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84b60c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9bf000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855a278c r4:855a2400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855a278c r4:855d8e80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b60c00 r8:855d8eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855d8e80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d8e80 r8:8027ecf4 r7:dfca9e60 r6:855d8f00 r5:84b60c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdd9fb0 to 0xdfdd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855e7040 INFO: task kworker/1:70:4327 is blocked on a mutex likely owned by task kworker/0:62:4441. task:kworker/0:62 state:R running task stack:0 pid:4441 tgid:4441 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:84920000 r8:80200be4 r7:dfefdd54 r6:ffffffff r5:84920000 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfefdd20 to 0xdfefdd68) dd20: 86ac6000 eb1ef000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 eb1ef000 8280c9b4 dfefdd9c dfefdda0 dfefdd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfefddc0 r5:dfefde08 r4:dfefddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c8640 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84920000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfccb000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855a2f8c r4:855a2c00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855a2f8c r4:855d3080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84920000 r8:855d30ac r7:82804d40 r6:dddced40 r5:dddced60 r4:855d3080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d3080 r8:8027ecf4 r7:dfd79e60 r6:855d3100 r5:84920000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfefdfb0 to 0xdfefdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855c8ec0 INFO: task kworker/0:61:4438 blocked for more than 430 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:61 state:D stack:0 pid:4438 tgid:4438 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dfd79d84 r8:00000002 r7:60000013 r6:dfd79d8c r5:84e80000 r4:84e80000 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:84e80000 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd79e08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855d45c0 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84e80000 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9d000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84f67b8c r4:84f67800 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84f67b8c r4:855dff80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e80000 r8:855dffac r7:82804d40 r6:dddced40 r5:dddced60 r4:855dff80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855dff80 r8:8027ecf4 r7:dfea1e60 r6:855df400 r5:84e80000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd79fb0 to 0xdfd79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855c8440 INFO: task kworker/0:61:4438 is blocked on a mutex likely owned by task kworker/0:62:4441. task:kworker/0:62 state:R running task stack:0 pid:4441 tgid:4441 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:84920000 r8:80200be4 r7:dfefdd54 r6:ffffffff r5:84920000 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfefdd20 to 0xdfefdd68) dd20: 86ac6000 eb1ef000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 eb1ef000 8280c9b4 dfefdd9c dfefdda0 dfefdd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfefddc0 r5:dfefde08 r4:dfefddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c8640 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84920000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfccb000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855a2f8c r4:855a2c00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855a2f8c r4:855d3080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84920000 r8:855d30ac r7:82804d40 r6:dddced40 r5:dddced60 r4:855d3080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d3080 r8:8027ecf4 r7:dfd79e60 r6:855d3100 r5:84920000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfefdfb0 to 0xdfefdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855c8ec0 INFO: task kworker/0:63:4444 blocked for more than 430 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:63 state:D stack:0 pid:4444 tgid:4444 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dfd71d84 r8:00000002 r7:60000113 r6:dfd71d8c r5:84920c00 r4:84920c00 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:84920c00 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd71e08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849dd300 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84920c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb3b000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855a0f8c r4:855a0c00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855a0f8c r4:855d3180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84920c00 r8:855d31ac r7:82804d40 r6:dddced40 r5:dddced60 r4:855d3180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d3180 r8:8027ecf4 r7:dfd79e60 r6:855d3200 r5:84920c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd71fb0 to 0xdfd71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855c8a00 INFO: task kworker/0:63:4444 is blocked on a mutex likely owned by task kworker/0:62:4441. task:kworker/0:62 state:R running task stack:0 pid:4441 tgid:4441 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:84920000 r8:80200be4 r7:dfefdd54 r6:ffffffff r5:84920000 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfefdd20 to 0xdfefdd68) dd20: 86db1000 eb1ef000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 eb1ef000 8280c9b4 dfefdd9c dfefdda0 dfefdd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfefddc0 r5:dfefde08 r4:dfefddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c8640 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84920000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfccb000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855a2f8c r4:855a2c00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855a2f8c r4:855d3080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84920000 r8:855d30ac r7:82804d40 r6:dddced40 r5:dddced60 r4:855d3080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d3080 r8:8027ecf4 r7:dfd79e60 r6:855d3100 r5:84920000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfefdfb0 to 0xdfefdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855c8ec0 INFO: task kworker/0:64:4447 blocked for more than 430 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:64 state:D stack:0 pid:4447 tgid:4447 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dfd7dd84 r8:00000002 r7:60000013 r6:dfd7dd8c r5:84921800 r4:84921800 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:84921800 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd7de08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e5680 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84921800 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf5000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855a378c r4:855a3400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855a378c r4:855d3280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84921800 r8:855d32ac r7:82804d40 r6:dddced40 r5:dddced60 r4:855d3280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d3280 r8:8027ecf4 r7:dfd79e60 r6:855d3300 r5:84921800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd7dfb0 to 0xdfd7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855ceb00 INFO: task kworker/0:64:4447 is blocked on a mutex likely owned by task kworker/0:62:4441. task:kworker/0:62 state:R running task stack:0 pid:4441 tgid:4441 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:84920000 r8:80200be4 r7:dfefdd54 r6:ffffffff r5:84920000 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfefdd20 to 0xdfefdd68) dd20: 86db1000 eb1ef000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 eb1ef000 8280c9b4 dfefdd9c dfefdda0 dfefdd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfefddc0 r5:dfefde08 r4:dfefddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c8640 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84920000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfccb000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855a2f8c r4:855a2c00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855a2f8c r4:855d3080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84920000 r8:855d30ac r7:82804d40 r6:dddced40 r5:dddced60 r4:855d3080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d3080 r8:8027ecf4 r7:dfd79e60 r6:855d3100 r5:84920000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfefdfb0 to 0xdfefdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855c8ec0 INFO: task kworker/0:65:4452 blocked for more than 430 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:65 state:D stack:0 pid:4452 tgid:4452 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dfd15d84 r8:00000002 r7:60000013 r6:dfd15d8c r5:84923000 r4:84923000 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:84923000 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd15e08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84880900 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84923000 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe05000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855ad78c r4:855ad400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855ad78c r4:855d3400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84923000 r8:855d342c r7:82804d40 r6:dddced40 r5:dddced60 r4:855d3400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d3400 r8:8027ecf4 r7:dfd79e60 r6:855d3380 r5:84923000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd15fb0 to 0xdfd15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:848a6340 INFO: task kworker/0:65:4452 is blocked on a mutex likely owned by task kworker/0:62:4441. task:kworker/0:62 state:R running task stack:0 pid:4441 tgid:4441 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:84920000 r8:80200be4 r7:dfefdd54 r6:ffffffff r5:84920000 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfefdd20 to 0xdfefdd68) dd20: 86db1000 eb1ef000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 eb1ef000 8280c9b4 dfefdd9c dfefdda0 dfefdd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfefddc0 r5:dfefde08 r4:dfefddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c8640 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84920000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfccb000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855a2f8c r4:855a2c00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855a2f8c r4:855d3080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84920000 r8:855d30ac r7:82804d40 r6:dddced40 r5:dddced60 r4:855d3080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d3080 r8:8027ecf4 r7:dfd79e60 r6:855d3100 r5:84920000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfefdfb0 to 0xdfefdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855c8ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:66:4453 blocked for more than 430 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:66 state:D stack:0 pid:4453 tgid:4453 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dfda9d84 r8:00000002 r7:60000113 r6:dfda9d8c r5:84922400 r4:84922400 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:84922400 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfda9e08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855d41c0 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84922400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc1d000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84f8a78c r4:84f8a400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84f8a78c r4:855d3480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84922400 r8:855d34ac r7:82804d40 r6:dddced40 r5:dddced60 r4:855d3480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d3480 r8:8027ecf4 r7:dfd15e60 r6:855d3500 r5:84922400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfda9fb0 to 0xdfda9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855d4600 INFO: task kworker/0:66:4453 is blocked on a mutex likely owned by task kworker/0:62:4441. task:kworker/0:62 state:R running task stack:0 pid:4441 tgid:4441 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:84920000 r8:80200be4 r7:dfefdd54 r6:ffffffff r5:84920000 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfefdd20 to 0xdfefdd68) dd20: 86db1000 eb1ef000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 eb1ef000 8280c9b4 dfefdd9c dfefdda0 dfefdd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfefddc0 r5:dfefde08 r4:dfefddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c8640 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84920000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfccb000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855a2f8c r4:855a2c00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855a2f8c r4:855d3080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84920000 r8:855d30ac r7:82804d40 r6:dddced40 r5:dddced60 r4:855d3080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d3080 r8:8027ecf4 r7:dfd79e60 r6:855d3100 r5:84920000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfefdfb0 to 0xdfefdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855c8ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:67:4460 blocked for more than 430 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:67 state:D stack:0 pid:4460 tgid:4460 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dfeb1d84 r8:00000002 r7:60000113 r6:dfeb1d8c r5:84926000 r4:84926000 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:84926000 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfeb1e08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8541b300 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84926000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9ad000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855adb8c r4:855ad800 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855adb8c r4:855d3600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84926000 r8:855d362c r7:82804d40 r6:dddced40 r5:dddced60 r4:855d3600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d3600 r8:8027ecf4 r7:dfda9e60 r6:855d3680 r5:84926000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfeb1fb0 to 0xdfeb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855e4040 INFO: task kworker/0:67:4460 is blocked on a mutex likely owned by task kworker/0:62:4441. task:kworker/0:62 state:R running task stack:0 pid:4441 tgid:4441 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:84920000 r8:80200be4 r7:dfefdd54 r6:ffffffff r5:84920000 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfefdd20 to 0xdfefdd68) dd20: 86db1000 eb1ef000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 eb1ef000 8280c9b4 dfefdd9c dfefdda0 dfefdd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfefddc0 r5:dfefde08 r4:dfefddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c8640 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84920000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfccb000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855a2f8c r4:855a2c00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855a2f8c r4:855d3080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84920000 r8:855d30ac r7:82804d40 r6:dddced40 r5:dddced60 r4:855d3080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d3080 r8:8027ecf4 r7:dfd79e60 r6:855d3100 r5:84920000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfefdfb0 to 0xdfefdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855c8ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:68:4461 blocked for more than 430 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:68 state:D stack:0 pid:4461 tgid:4461 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dfe21d84 r8:00000002 r7:60000013 r6:dfe21d8c r5:84925400 r4:84925400 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:84925400 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe21e08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eeeb80 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84925400 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcd9000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855aff8c r4:855afc00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855aff8c r4:855d3700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84925400 r8:855d372c r7:82804d40 r6:dddced40 r5:dddced60 r4:855d3700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d3700 r8:8027ecf4 r7:dfda9e60 r6:855d3780 r5:84925400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe21fb0 to 0xdfe21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855c8cc0 INFO: task kworker/0:68:4461 is blocked on a mutex likely owned by task kworker/0:62:4441. task:kworker/0:62 state:R running task stack:0 pid:4441 tgid:4441 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:84920000 r8:80200be4 r7:dfefdd54 r6:ffffffff r5:84920000 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfefdd20 to 0xdfefdd68) dd20: 86db1000 eb1ef000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 eb1ef000 8280c9b4 dfefdd9c dfefdda0 dfefdd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfefddc0 r5:dfefde08 r4:dfefddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c8640 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84920000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfccb000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855a2f8c r4:855a2c00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855a2f8c r4:855d3080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84920000 r8:855d30ac r7:82804d40 r6:dddced40 r5:dddced60 r4:855d3080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d3080 r8:8027ecf4 r7:dfd79e60 r6:855d3100 r5:84920000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfefdfb0 to 0xdfefdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855c8ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:69:4469 blocked for more than 430 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:69 state:D stack:0 pid:4469 tgid:4469 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dfeedd84 r8:00000002 r7:60000013 r6:dfeedd8c r5:84924800 r4:84924800 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:84924800 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfeede08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855cff40 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84924800 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfebd000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84f8af8c r4:84f8ac00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84f8af8c r4:855d3800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84924800 r8:855d382c r7:82804d40 r6:dddced40 r5:dddced60 r4:855d3800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d3800 r8:8027ecf4 r7:dfda9e60 r6:855d3880 r5:84924800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfeedfb0 to 0xdfeedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855d70c0 INFO: task kworker/0:69:4469 is blocked on a mutex likely owned by task kworker/0:62:4441. task:kworker/0:62 state:R running task stack:0 pid:4441 tgid:4441 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:84920000 r8:80200be4 r7:dfefdd54 r6:ffffffff r5:84920000 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfefdd20 to 0xdfefdd68) dd20: 86db1000 eb1ef000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 eb1ef000 8280c9b4 dfefdd9c dfefdda0 dfefdd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfefddc0 r5:dfefde08 r4:dfefddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c8640 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84920000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfccb000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855a2f8c r4:855a2c00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855a2f8c r4:855d3080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84920000 r8:855d30ac r7:82804d40 r6:dddced40 r5:dddced60 r4:855d3080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d3080 r8:8027ecf4 r7:dfd79e60 r6:855d3100 r5:84920000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfefdfb0 to 0xdfefdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855c8ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:70:4471 blocked for more than 431 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:70 state:D stack:0 pid:4471 tgid:4471 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dfeddd84 r8:00000002 r7:60000013 r6:dfeddd8c r5:84923c00 r4:84923c00 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:84923c00 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfedde08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855cf380 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84923c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb81000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84f89f8c r4:84f89c00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84f89f8c r4:855d3900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84923c00 r8:855d392c r7:82804d40 r6:dddced40 r5:dddced60 r4:855d3900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d3900 r8:8027ecf4 r7:dfda9e60 r6:855d3980 r5:84923c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfeddfb0 to 0xdfeddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855d70c0 INFO: task kworker/0:70:4471 is blocked on a mutex likely owned by task kworker/0:62:4441. task:kworker/0:62 state:R running task stack:0 pid:4441 tgid:4441 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:84920000 r8:80200be4 r7:dfefdd54 r6:ffffffff r5:84920000 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfefdd20 to 0xdfefdd68) dd20: 86db1000 eb1ef000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 eb1ef000 8280c9b4 dfefdd9c dfefdda0 dfefdd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfefddc0 r5:dfefde08 r4:dfefddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c8640 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84920000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfccb000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855a2f8c r4:855a2c00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855a2f8c r4:855d3080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84920000 r8:855d30ac r7:82804d40 r6:dddced40 r5:dddced60 r4:855d3080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d3080 r8:8027ecf4 r7:dfd79e60 r6:855d3100 r5:84920000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfefdfb0 to 0xdfefdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855c8ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:72:4481 blocked for more than 431 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:72 state:D stack:0 pid:4481 tgid:4481 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dfdb5d84 r8:00000002 r7:60000113 r6:dfdb5d8c r5:84cea400 r4:84cea400 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:84cea400 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdb5e08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855d7d40 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84cea400 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd19000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855afb8c r4:855af800 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855afb8c r4:855d3c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84cea400 r8:855d3c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:855d3c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d3c00 r8:8027ecf4 r7:dfdade60 r6:855d3c80 r5:84cea400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdb5fb0 to 0xdfdb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855d7d80 INFO: task kworker/0:72:4481 is blocked on a mutex likely owned by task kworker/0:62:4441. task:kworker/0:62 state:R running task stack:0 pid:4441 tgid:4441 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:84920000 r8:80200be4 r7:dfefdd54 r6:ffffffff r5:84920000 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfefdd20 to 0xdfefdd68) dd20: 86db1000 eb1ef000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 eb1ef000 8280c9b4 dfefdd9c dfefdda0 dfefdd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfefddc0 r5:dfefde08 r4:dfefddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c8640 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84920000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfccb000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855a2f8c r4:855a2c00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855a2f8c r4:855d3080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84920000 r8:855d30ac r7:82804d40 r6:dddced40 r5:dddced60 r4:855d3080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d3080 r8:8027ecf4 r7:dfd79e60 r6:855d3100 r5:84920000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfefdfb0 to 0xdfefdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855c8ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:73:4482 blocked for more than 431 seconds. Not tainted 6.16.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:73 state:D stack:0 pid:4482 tgid:4482 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30820>] (__schedule_loop kernel/sched/core.c:6868 [inline]) [<81a2f898>] (__schedule) from [<81a30820>] (schedule+0x2c/0x130 kernel/sched/core.c:6883) r10:829185c4 r9:dfdd1d84 r8:00000002 r7:60000113 r6:dfdd1d8c r5:84ce9800 r4:84ce9800 [<81a307f4>] (schedule) from [<81a30c08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6940) r5:84ce9800 r4:829185c0 [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a30bf0>] (schedule_preempt_disabled) from [<81a332ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a32fec>] (__mutex_lock.constprop.0) from [<81a337b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdd1e08 r4:00000000 [<81a337a4>] (__mutex_lock_slowpath) from [<81a337f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a337bc>] (mutex_lock) from [<804e436c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855d7f80 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84ce9800 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855ae78c r4:855ae400 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855ae78c r4:855d3d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ce9800 r8:855d3d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:855d3d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d3d00 r8:8027ecf4 r7:dfdade60 r6:855d3d80 r5:84ce9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdd1fb0 to 0xdfdd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855d7900 INFO: task kworker/0:73:4482 is blocked on a mutex likely owned by task kworker/0:62:4441. task:kworker/0:62 state:R running task stack:0 pid:4441 tgid:4441 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a2f898>] (__schedule) from [<81a30c54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7113) r10:8280c9b4 r9:84920000 r8:80200be4 r7:dfefdd54 r6:ffffffff r5:84920000 r4:00000000 [<81a30c14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfefdd20 to 0xdfefdd68) dd20: 86db1000 eb1ef000 00000001 80239bb8 7f00b000 00000001 82abf1c4 82abe5a0 dd40: 7f00b000 eb1ef000 8280c9b4 dfefdd9c dfefdda0 dfefdd70 80230af0 80239bd0 dd60: 80000113 ffffffff r5:80000113 r4:80239bd0 [<80230a8c>] (flush_tlb_kernel_range) from [<804e4130>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e3eac>] (__purge_vmap_area_lazy) from [<804e44e8>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfefddc0 r5:dfefde08 r4:dfefddc0 [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4304>] (_vm_unmap_aliases) from [<804e825c>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c8640 r4:00000000 [<804e80f0>] (vfree) from [<8054ddbc>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84920000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054dd8c>] (execmem_free) from [<803c5dc0>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfccb000 [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c5db0>] (bpf_jit_free_exec) from [<803c61a0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6138>] (bpf_jit_free) from [<803c7230>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855a2f8c r4:855a2c00 [<803c70e4>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855a2f8c r4:855d3080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84920000 r8:855d30ac r7:82804d40 r6:dddced40 r5:dddced60 r4:855d3080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d3080 r8:8027ecf4 r7:dfd79e60 r6:855d3100 r5:84920000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfefdfb0 to 0xdfefdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855c8ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.16.0-rc5-syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Call trace: [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:00000000 r6:000f0113 r5:600f0193 r4:8225c2a4 [<80201ae4>] (show_stack) from [<8021fd88>] (__dump_stack lib/dump_stack.c:94 [inline]) [<80201ae4>] (show_stack) from [<8021fd88>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:120) [<8021fd18>] (dump_stack_lvl) from [<8021fdac>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r5:00000001 r4:00000001 [<8021fd94>] (dump_stack) from [<81a197b4>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113) [<81a19654>] (nmi_cpu_backtrace) from [<81a19900>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000001 r6:8280c690 r5:8281af40 r4:ffffffff [<81a197d0>] (nmi_trigger_cpumask_backtrace) from [<802304fc>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:852) r9:8280c80c r8:82ab3564 r7:8281bb28 r6:00007c65 r5:8281b508 r4:85a03c0c [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037ff64>] (trigger_all_cpu_backtrace include/linux/nmi.h:158 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037ff64>] (check_hung_uninterruptible_tasks kernel/hung_task.c:307 [inline]) [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037ff64>] (watchdog+0x4a8/0x74c kernel/hung_task.c:470) [<8037fabc>] (watchdog) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:8037fabc r7:8329e300 r6:8329e300 r5:832dc800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8338a180 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 2825 Comm: pr/ttyAMA0 Not tainted 6.16.0-rc5-syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express PC is at __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 kernel/locking/spinlock.c:194 LR is at spin_unlock_irqrestore include/linux/spinlock.h:406 [inline] LR is at __uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline] LR is at pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603 pc : [<81a38d94>] lr : [<80a70c14>] psr: 60000113 sp : ebae5eb0 ip : ebae5ec0 fp : ebae5ebc r10: 8295a38c r9 : 00000000 r8 : 00000000 r7 : 00000117 r6 : 8295a2f0 r5 : 00000000 r4 : 00000001 r3 : 000007f8 r2 : 00000000 r1 : 60000113 r0 : 84a99c40 Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user Control: 30c5387d Table: 84cb8080 DAC: fffffffd Call trace: [<81a38d6c>] (_raw_spin_unlock_irqrestore) from [<80a70c14>] (spin_unlock_irqrestore include/linux/spinlock.h:406 [inline]) [<81a38d6c>] (_raw_spin_unlock_irqrestore) from [<80a70c14>] (__uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline]) [<81a38d6c>] (_raw_spin_unlock_irqrestore) from [<80a70c14>] (pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603) [<80a70bf4>] (pl011_console_device_unlock) from [<802e7e24>] (nbcon_emit_one+0x80/0xf8 kernel/printk/nbcon.c:1123) [<802e7da4>] (nbcon_emit_one) from [<802e8044>] (nbcon_kthread_func+0x1a8/0x2a4 kernel/printk/nbcon.c:1210) r6:8280c690 r5:842a0c00 r4:8295a2f0 [<802e7e9c>] (nbcon_kthread_func) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8295a2f0 r8:802e7e9c r7:84767b00 r6:84767b00 r5:842a0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebae5fb0 to 0xebae5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:841bc9c0