INFO: task kworker/0:0:9 blocked for more than 430 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:0 state:D stack:0 pid:9 tgid:9 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf3a4>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<819be41c>] (__schedule) from [<819bf3a4>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82718544 r9:df83dd84 r8:00000002 r7:60000013 r6:df83dd8c r5:82e36000 r4:82e36000 [<819bf378>] (schedule) from [<819bf78c>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:82e36000 r4:82718540 [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<819c1b70>] (__mutex_lock.constprop.0) from [<819c233c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8260c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df83de08 r4:00000000 [<819c2328>] (__mutex_lock_slowpath) from [<819c237c>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<819c2340>] (mutex_lock) from [<804e431c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84692a40 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18005 r8:82e36000 r7:00000000 r6:82c18000 r5:00001000 r4:7f02b000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa4b000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8416af8c r4:8416ac00 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:82c18000 r5:8416af8c r4:82cb7400 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:82e36000 r8:82cb742c r7:82604d40 r6:dddced40 r5:dddced60 r4:82cb7400 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:82cb7400 r8:8027e8dc r7:df819e48 r6:82cb7480 r5:82e36000 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf83dfb0 to 0xdf83dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:82cb6180 INFO: task kworker/0:0:9 is blocked on a mutex likely owned by task kworker/1:66:4095. task:kworker/1:66 state:R running task stack:0 pid:4095 tgid:4095 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf7d8>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8260c9b4 r9:84e1ec00 r8:80200be4 r7:dfd61d54 r6:ffffffff r5:84e1ec00 r4:00000000 [<819bf798>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfd61d20 to 0xdfd61d68) 1d20: e929f000 ecfd7000 00000001 80239a78 7f029000 00000001 828b51c4 828b45a0 1d40: 7f029000 ecfd7000 8260c9b4 dfd61d9c dfd61da0 dfd61d70 802309b0 80239a90 1d60: 80000013 ffffffff r5:80000013 r4:80239a90 [<8023094c>] (flush_tlb_kernel_range) from [<804e40e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:828b51e4 [<804e3e5c>] (__purge_vmap_area_lazy) from [<804e4498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd61dc0 r5:dfd61e08 r4:dfd61dc0 [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a2c0 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:84e1ec00 r7:00000000 r6:82c18200 r5:00001000 r4:7f045000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdcb000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84185b8c r4:84185800 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:84185b8c r4:84d41f00 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e1ec00 r8:84d41f2c r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d41f00 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d41f00 r8:8027e8dc r7:dfd55e60 r6:84eb8780 r5:84e1ec00 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd61fb0 to 0xdfd61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84ebc6c0 INFO: task kworker/1:1:43 blocked for more than 430 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1 state:D stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf3a4>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<819be41c>] (__schedule) from [<819bf3a4>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82718544 r9:df911d84 r8:00000002 r7:60000013 r6:df911d8c r5:82f48c00 r4:82f48c00 [<819bf378>] (schedule) from [<819bf78c>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:82f48c00 r4:82718540 [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<819c1b70>] (__mutex_lock.constprop.0) from [<819c233c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8260c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df911e08 r4:00000000 [<819c2328>] (__mutex_lock_slowpath) from [<819c237c>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<819c2340>] (mutex_lock) from [<804e431c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eaff80 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:82f48c00 r7:00000000 r6:82c18200 r5:00001000 r4:7f029000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa01000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84f20b8c r4:84f20800 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:84f20b8c r4:82fbb000 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:82f48c00 r8:82fbb02c r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:82fbb000 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:82fbb000 r8:8027e8dc r7:df879e60 r6:82fbb080 r5:82f48c00 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:82fa9f00 INFO: task kworker/1:1:43 is blocked on a mutex likely owned by task kworker/1:66:4095. task:kworker/1:66 state:R running task stack:0 pid:4095 tgid:4095 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf7d8>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8260c9b4 r9:84e1ec00 r8:80200be4 r7:dfd61d54 r6:ffffffff r5:84e1ec00 r4:00000000 [<819bf798>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfd61d20 to 0xdfd61d68) 1d20: ea606000 ecfd7000 00000001 80239a78 7f029000 00000001 828b51c4 828b45a0 1d40: 7f029000 ecfd7000 8260c9b4 dfd61d9c dfd61da0 dfd61d70 802309b0 80239a90 1d60: 80000013 ffffffff r5:80000013 r4:80239a90 [<8023094c>] (flush_tlb_kernel_range) from [<804e40e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:828b51e4 [<804e3e5c>] (__purge_vmap_area_lazy) from [<804e4498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd61dc0 r5:dfd61e08 r4:dfd61dc0 [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a2c0 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:84e1ec00 r7:00000000 r6:82c18200 r5:00001000 r4:7f045000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdcb000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84185b8c r4:84185800 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:84185b8c r4:84d41f00 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e1ec00 r8:84d41f2c r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d41f00 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d41f00 r8:8027e8dc r7:dfd55e60 r6:84eb8780 r5:84e1ec00 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd61fb0 to 0xdfd61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84ebc6c0 INFO: task kworker/1:2:44 blocked for more than 430 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:2 state:D stack:0 pid:44 tgid:44 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf3a4>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<819be41c>] (__schedule) from [<819bf3a4>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82718544 r9:df915d84 r8:00000002 r7:60000113 r6:df915d8c r5:82f49800 r4:82f49800 [<819bf378>] (schedule) from [<819bf78c>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:82f49800 r4:82718540 [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<819c1b70>] (__mutex_lock.constprop.0) from [<819c233c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8260c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df915e08 r4:00000000 [<819c2328>] (__mutex_lock_slowpath) from [<819c237c>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<819c2340>] (mutex_lock) from [<804e431c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ebc440 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:82f49800 r7:00000000 r6:82c18200 r5:00001000 r4:7f00b000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff73000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e9b78c r4:84e9b400 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:84e9b78c r4:82fbb200 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:82f49800 r8:82fbb22c r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:82fbb200 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:82fbb200 r8:8027e8dc r7:df911e60 r6:82fbb400 r5:82f49800 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf915fb0 to 0xdf915ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:82fbc100 INFO: task kworker/1:2:44 is blocked on a mutex likely owned by task kworker/1:66:4095. task:kworker/1:66 state:R running task stack:0 pid:4095 tgid:4095 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf7d8>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8260c9b4 r9:84e1ec00 r8:80200be4 r7:dfd61d54 r6:ffffffff r5:84e1ec00 r4:00000000 [<819bf798>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfd61d20 to 0xdfd61d68) 1d20: ea78b000 ecfd7000 00000001 80239a78 7f029000 00000001 828b51c4 828b45a0 1d40: 7f029000 ecfd7000 8260c9b4 dfd61d9c dfd61da0 dfd61d70 802309b0 80239a90 1d60: 80000013 ffffffff r5:80000013 r4:80239a90 [<8023094c>] (flush_tlb_kernel_range) from [<804e40e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:828b51e4 [<804e3e5c>] (__purge_vmap_area_lazy) from [<804e4498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd61dc0 r5:dfd61e08 r4:dfd61dc0 [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a2c0 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:84e1ec00 r7:00000000 r6:82c18200 r5:00001000 r4:7f045000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdcb000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84185b8c r4:84185800 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:84185b8c r4:84d41f00 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e1ec00 r8:84d41f2c r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d41f00 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d41f00 r8:8027e8dc r7:dfd55e60 r6:84eb8780 r5:84e1ec00 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd61fb0 to 0xdfd61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84ebc6c0 INFO: task kworker/0:5:3828 blocked for more than 430 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:5 state:D stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf3a4>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<819be41c>] (__schedule) from [<819bf3a4>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82718544 r9:dfdd5d84 r8:00000002 r7:60000013 r6:dfdd5d8c r5:84dea400 r4:84dea400 [<819bf378>] (schedule) from [<819bf78c>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:84dea400 r4:82718540 [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<819c1b70>] (__mutex_lock.constprop.0) from [<819c233c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8260c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdd5e08 r4:00000000 [<819c2328>] (__mutex_lock_slowpath) from [<819c237c>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<819c2340>] (mutex_lock) from [<804e431c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d99140 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18005 r8:84dea400 r7:00000000 r6:82c18000 r5:00001000 r4:7f029000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa32000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ce7f8c r4:84ce7c00 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:82c18000 r5:84ce7f8c r4:84689700 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84dea400 r8:8468972c r7:82604d40 r6:dddced40 r5:dddced60 r4:84689700 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84689700 r8:8027e8dc r7:eb8e9e60 r6:84689c00 r5:84dea400 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdd5fb0 to 0xdfdd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84d849c0 INFO: task kworker/0:5:3828 is blocked on a mutex likely owned by task kworker/1:66:4095. task:kworker/1:66 state:R running task stack:0 pid:4095 tgid:4095 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf7d8>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8260c9b4 r9:84e1ec00 r8:80200be4 r7:dfd61d54 r6:ffffffff r5:84e1ec00 r4:00000000 [<819bf798>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfd61d20 to 0xdfd61d68) 1d20: eb094000 ecfd7000 00000001 80239a78 7f029000 00000001 828b51c4 828b45a0 1d40: 7f029000 ecfd7000 8260c9b4 dfd61d9c dfd61da0 dfd61d70 802309b0 80239a90 1d60: 80000013 ffffffff r5:80000013 r4:80239a90 [<8023094c>] (flush_tlb_kernel_range) from [<804e40e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:828b51e4 [<804e3e5c>] (__purge_vmap_area_lazy) from [<804e4498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd61dc0 r5:dfd61e08 r4:dfd61dc0 [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a2c0 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:84e1ec00 r7:00000000 r6:82c18200 r5:00001000 r4:7f045000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdcb000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84185b8c r4:84185800 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:84185b8c r4:84d41f00 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e1ec00 r8:84d41f2c r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d41f00 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d41f00 r8:8027e8dc r7:dfd55e60 r6:84eb8780 r5:84e1ec00 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd61fb0 to 0xdfd61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84ebc6c0 INFO: task kworker/0:35:4078 blocked for more than 430 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:35 state:D stack:0 pid:4078 tgid:4078 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf3a4>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<819be41c>] (__schedule) from [<819bf3a4>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82718544 r9:dfc2dd84 r8:00000002 r7:60000013 r6:dfc2dd8c r5:84e5ec00 r4:84e5ec00 [<819bf378>] (schedule) from [<819bf78c>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:84e5ec00 r4:82718540 [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<819c1b70>] (__mutex_lock.constprop.0) from [<819c233c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8260c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc2de08 r4:00000000 [<819c2328>] (__mutex_lock_slowpath) from [<819c237c>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<819c2340>] (mutex_lock) from [<804e431c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ebe2c0 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18005 r8:84e5ec00 r7:00000000 r6:82c18000 r5:00001000 r4:7f04b000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbc3000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e9a38c r4:84e9a000 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:82c18000 r5:84e9a38c r4:84eb8480 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e5ec00 r8:84eb84ac r7:82604d40 r6:dddced40 r5:dddced60 r4:84eb8480 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eb8480 r8:8027e8dc r7:dfaa5e60 r6:84d41880 r5:84e5ec00 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc2dfb0 to 0xdfc2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84eb9ec0 INFO: task kworker/0:35:4078 is blocked on a mutex likely owned by task kworker/1:66:4095. task:kworker/1:66 state:R running task stack:0 pid:4095 tgid:4095 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf7d8>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8260c9b4 r9:84e1ec00 r8:80200be4 r7:dfd61d54 r6:ffffffff r5:84e1ec00 r4:00000000 [<819bf798>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfd61d20 to 0xdfd61d68) 1d20: eb094000 ecfd7000 00000001 80239a78 7f029000 00000001 828b51c4 828b45a0 1d40: 7f029000 ecfd7000 8260c9b4 dfd61d9c dfd61da0 dfd61d70 802309b0 80239a90 1d60: 80000013 ffffffff r5:80000013 r4:80239a90 [<8023094c>] (flush_tlb_kernel_range) from [<804e40e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:828b51e4 [<804e3e5c>] (__purge_vmap_area_lazy) from [<804e4498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd61dc0 r5:dfd61e08 r4:dfd61dc0 [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a2c0 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:84e1ec00 r7:00000000 r6:82c18200 r5:00001000 r4:7f045000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdcb000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84185b8c r4:84185800 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:84185b8c r4:84d41f00 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e1ec00 r8:84d41f2c r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d41f00 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d41f00 r8:8027e8dc r7:dfd55e60 r6:84eb8780 r5:84e1ec00 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd61fb0 to 0xdfd61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84ebc6c0 INFO: task kworker/1:67:4097 blocked for more than 430 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:67 state:D stack:0 pid:4097 tgid:4097 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf3a4>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<819be41c>] (__schedule) from [<819bf3a4>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82718544 r9:dfd79d84 r8:00000002 r7:60000013 r6:dfd79d8c r5:834a8000 r4:834a8000 [<819bf378>] (schedule) from [<819bf78c>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:834a8000 r4:82718540 [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<819c1b70>] (__mutex_lock.constprop.0) from [<819c233c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8260c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd79e08 r4:00000000 [<819c2328>] (__mutex_lock_slowpath) from [<819c237c>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<819c2340>] (mutex_lock) from [<804e431c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eae040 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:834a8000 r7:00000000 r6:82c18200 r5:00001000 r4:7f063000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe4f000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8418678c r4:84186400 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:8418678c r4:84d41f80 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:834a8000 r8:84d41fac r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d41f80 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d41f80 r8:8027e8dc r7:dfd55e60 r6:84eb8980 r5:834a8000 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd79fb0 to 0xdfd79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84ebcc40 INFO: task kworker/1:67:4097 is blocked on a mutex likely owned by task kworker/1:66:4095. task:kworker/1:66 state:R running task stack:0 pid:4095 tgid:4095 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf7d8>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8260c9b4 r9:84e1ec00 r8:80200be4 r7:dfd61d54 r6:ffffffff r5:84e1ec00 r4:00000000 [<819bf798>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfd61d20 to 0xdfd61d68) 1d20: eb48c000 ecfd7000 00000001 80239a78 7f029000 00000001 828b51c4 828b45a0 1d40: 7f029000 ecfd7000 8260c9b4 dfd61d9c dfd61da0 dfd61d70 802309b0 80239a90 1d60: 80000013 ffffffff r5:80000013 r4:80239a90 [<8023094c>] (flush_tlb_kernel_range) from [<804e40e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:828b51e4 [<804e3e5c>] (__purge_vmap_area_lazy) from [<804e4498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd61dc0 r5:dfd61e08 r4:dfd61dc0 [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a2c0 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:84e1ec00 r7:00000000 r6:82c18200 r5:00001000 r4:7f045000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdcb000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84185b8c r4:84185800 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:84185b8c r4:84d41f00 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e1ec00 r8:84d41f2c r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d41f00 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d41f00 r8:8027e8dc r7:dfd55e60 r6:84eb8780 r5:84e1ec00 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd61fb0 to 0xdfd61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84ebc6c0 INFO: task kworker/1:69:4104 blocked for more than 430 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:69 state:D stack:0 pid:4104 tgid:4104 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf3a4>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<819be41c>] (__schedule) from [<819bf3a4>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82718544 r9:dfe59d84 r8:00000002 r7:60000013 r6:dfe59d8c r5:84e12400 r4:84e12400 [<819bf378>] (schedule) from [<819bf78c>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:84e12400 r4:82718540 [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<819c1b70>] (__mutex_lock.constprop.0) from [<819c233c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8260c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe59e08 r4:00000000 [<819c2328>] (__mutex_lock_slowpath) from [<819c237c>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<819c2340>] (mutex_lock) from [<804e431c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ebc380 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:84e12400 r7:00000000 r6:82c18200 r5:00001000 r4:7f061000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe3d000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8418638c r4:84186000 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:8418638c r4:84d41480 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e12400 r8:84d414ac r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d41480 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d41480 r8:8027e8dc r7:dfd79e60 r6:84eb8880 r5:84e12400 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe59fb0 to 0xdfe59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84ebc440 INFO: task kworker/1:69:4104 is blocked on a mutex likely owned by task kworker/1:66:4095. task:kworker/1:66 state:R running task stack:0 pid:4095 tgid:4095 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf7d8>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8260c9b4 r9:84e1ec00 r8:80200be4 r7:dfd61d54 r6:ffffffff r5:84e1ec00 r4:00000000 [<819bf798>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfd61d20 to 0xdfd61d68) 1d20: eb48c000 ecfd7000 00000001 80239a78 7f029000 00000001 828b51c4 828b45a0 1d40: 7f029000 ecfd7000 8260c9b4 dfd61d9c dfd61da0 dfd61d70 802309b0 80239a90 1d60: 80000013 ffffffff r5:80000013 r4:80239a90 [<8023094c>] (flush_tlb_kernel_range) from [<804e40e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:828b51e4 [<804e3e5c>] (__purge_vmap_area_lazy) from [<804e4498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd61dc0 r5:dfd61e08 r4:dfd61dc0 [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a2c0 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:84e1ec00 r7:00000000 r6:82c18200 r5:00001000 r4:7f045000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdcb000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84185b8c r4:84185800 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:84185b8c r4:84d41f00 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e1ec00 r8:84d41f2c r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d41f00 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d41f00 r8:8027e8dc r7:dfd55e60 r6:84eb8780 r5:84e1ec00 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd61fb0 to 0xdfd61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84ebc6c0 INFO: task kworker/1:70:4105 blocked for more than 430 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:70 state:D stack:0 pid:4105 tgid:4105 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf3a4>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<819be41c>] (__schedule) from [<819bf3a4>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82718544 r9:dfe69d84 r8:00000002 r7:60000113 r6:dfe69d8c r5:84e13000 r4:84e13000 [<819bf378>] (schedule) from [<819bf78c>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:84e13000 r4:82718540 [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<819c1b70>] (__mutex_lock.constprop.0) from [<819c233c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8260c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe69e08 r4:00000000 [<819c2328>] (__mutex_lock_slowpath) from [<819c237c>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<819c2340>] (mutex_lock) from [<804e431c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eae500 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:84e13000 r7:00000000 r6:82c18200 r5:00001000 r4:7f065000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe95000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84186b8c r4:84186800 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:84186b8c r4:84d40000 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e13000 r8:84d4002c r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d40000 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d40000 r8:8027e8dc r7:dfd79e60 r6:84eb8a00 r5:84e13000 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe69fb0 to 0xdfe69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84eae0c0 INFO: task kworker/1:70:4105 is blocked on a mutex likely owned by task kworker/1:66:4095. task:kworker/1:66 state:R running task stack:0 pid:4095 tgid:4095 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf7d8>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8260c9b4 r9:84e1ec00 r8:80200be4 r7:dfd61d54 r6:ffffffff r5:84e1ec00 r4:00000000 [<819bf798>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfd61d20 to 0xdfd61d68) 1d20: eb72c000 ecfd7000 00000001 80239a78 7f029000 00000001 828b51c4 828b45a0 1d40: 7f029000 ecfd7000 8260c9b4 dfd61d9c dfd61da0 dfd61d70 802309b0 80239a90 1d60: 80000013 ffffffff r5:80000013 r4:80239a90 [<8023094c>] (flush_tlb_kernel_range) from [<804e40e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:828b51e4 [<804e3e5c>] (__purge_vmap_area_lazy) from [<804e4498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd61dc0 r5:dfd61e08 r4:dfd61dc0 [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a2c0 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:84e1ec00 r7:00000000 r6:82c18200 r5:00001000 r4:7f045000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdcb000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84185b8c r4:84185800 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:84185b8c r4:84d41f00 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e1ec00 r8:84d41f2c r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d41f00 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d41f00 r8:8027e8dc r7:dfd55e60 r6:84eb8780 r5:84e1ec00 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd61fb0 to 0xdfd61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84ebc6c0 INFO: task kworker/1:71:4107 blocked for more than 430 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:71 state:D stack:0 pid:4107 tgid:4107 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf3a4>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<819be41c>] (__schedule) from [<819bf3a4>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82718544 r9:dfd7dd84 r8:00000002 r7:60000013 r6:dfd7dd8c r5:84e11800 r4:84e11800 [<819bf378>] (schedule) from [<819bf78c>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:84e11800 r4:82718540 [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<819c1b70>] (__mutex_lock.constprop.0) from [<819c233c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8260c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd7de08 r4:00000000 [<819c2328>] (__mutex_lock_slowpath) from [<819c237c>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<819c2340>] (mutex_lock) from [<804e431c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eaeb00 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:84e11800 r7:00000000 r6:82c18200 r5:00001000 r4:7f06b000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeed000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8418778c r4:84187400 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:8418778c r4:84d40080 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e11800 r8:84d400ac r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d40080 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d40080 r8:8027e8dc r7:dfe69e60 r6:84eb8b00 r5:84e11800 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd7dfb0 to 0xdfd7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84eae3c0 INFO: task kworker/1:71:4107 is blocked on a mutex likely owned by task kworker/1:66:4095. task:kworker/1:66 state:R running task stack:0 pid:4095 tgid:4095 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf7d8>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8260c9b4 r9:84e1ec00 r8:80200be4 r7:dfd61d54 r6:ffffffff r5:84e1ec00 r4:00000000 [<819bf798>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfd61d20 to 0xdfd61d68) 1d20: eba55000 ecfd7000 00000001 80239a78 7f029000 00000001 828b51c4 828b45a0 1d40: 7f029000 ecfd7000 8260c9b4 dfd61d9c dfd61da0 dfd61d70 802309b0 80239a90 1d60: 80000013 ffffffff r5:80000013 r4:80239a90 [<8023094c>] (flush_tlb_kernel_range) from [<804e40e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:828b51e4 [<804e3e5c>] (__purge_vmap_area_lazy) from [<804e4498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd61dc0 r5:dfd61e08 r4:dfd61dc0 [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a2c0 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:84e1ec00 r7:00000000 r6:82c18200 r5:00001000 r4:7f045000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdcb000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84185b8c r4:84185800 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:84185b8c r4:84d41f00 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e1ec00 r8:84d41f2c r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d41f00 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d41f00 r8:8027e8dc r7:dfd55e60 r6:84eb8780 r5:84e1ec00 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd61fb0 to 0xdfd61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84ebc6c0 INFO: task kworker/1:72:4109 blocked for more than 430 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:72 state:D stack:0 pid:4109 tgid:4109 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf3a4>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<819be41c>] (__schedule) from [<819bf3a4>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82718544 r9:dfebdd84 r8:00000002 r7:60000113 r6:dfebdd8c r5:84e14800 r4:84e14800 [<819bf378>] (schedule) from [<819bf78c>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:84e14800 r4:82718540 [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<819c1b70>] (__mutex_lock.constprop.0) from [<819c233c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8260c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfebde08 r4:00000000 [<819c2328>] (__mutex_lock_slowpath) from [<819c237c>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<819c2340>] (mutex_lock) from [<804e431c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eae780 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:84e14800 r7:00000000 r6:82c18200 r5:00001000 r4:7f067000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea7000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84186f8c r4:84186c00 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:84186f8c r4:84d40180 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e14800 r8:84d401ac r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d40180 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d40180 r8:8027e8dc r7:dfd7de60 r6:84eb8a80 r5:84e14800 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84eae840 INFO: task kworker/1:72:4109 is blocked on a mutex likely owned by task kworker/1:66:4095. task:kworker/1:66 state:R running task stack:0 pid:4095 tgid:4095 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf7d8>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8260c9b4 r9:84e1ec00 r8:80200be4 r7:dfd61d54 r6:ffffffff r5:84e1ec00 r4:00000000 [<819bf798>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfd61d20 to 0xdfd61d68) 1d20: ebea6000 ecfd7000 00000001 80239a78 7f029000 00000001 828b51c4 828b45a0 1d40: 7f029000 ecfd7000 8260c9b4 dfd61d9c dfd61da0 dfd61d70 802309b0 80239a90 1d60: 80000013 ffffffff r5:80000013 r4:80239a90 [<8023094c>] (flush_tlb_kernel_range) from [<804e40e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:828b51e4 [<804e3e5c>] (__purge_vmap_area_lazy) from [<804e4498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd61dc0 r5:dfd61e08 r4:dfd61dc0 [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a2c0 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:84e1ec00 r7:00000000 r6:82c18200 r5:00001000 r4:7f045000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdcb000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84185b8c r4:84185800 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:84185b8c r4:84d41f00 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e1ec00 r8:84d41f2c r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d41f00 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d41f00 r8:8027e8dc r7:dfd55e60 r6:84eb8780 r5:84e1ec00 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd61fb0 to 0xdfd61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84ebc6c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:73:4110 blocked for more than 430 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:73 state:D stack:0 pid:4110 tgid:4110 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf3a4>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<819be41c>] (__schedule) from [<819bf3a4>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82718544 r9:dfec1d84 r8:00000002 r7:60000013 r6:dfec1d8c r5:84e15400 r4:84e15400 [<819bf378>] (schedule) from [<819bf78c>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:84e15400 r4:82718540 [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<819c1b70>] (__mutex_lock.constprop.0) from [<819c233c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8260c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfec1e08 r4:00000000 [<819c2328>] (__mutex_lock_slowpath) from [<819c237c>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<819c2340>] (mutex_lock) from [<804e431c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eae880 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:84e15400 r7:00000000 r6:82c18200 r5:00001000 r4:7f069000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee1000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8418738c r4:84187000 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:8418738c r4:84d40100 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e15400 r8:84d4012c r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d40100 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d40100 r8:8027e8dc r7:dfd7de60 r6:84eb8b80 r5:84e15400 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfec1fb0 to 0xdfec1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84eae4c0 INFO: task kworker/1:73:4110 is blocked on a mutex likely owned by task kworker/1:66:4095. task:kworker/1:66 state:R running task stack:0 pid:4095 tgid:4095 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf7d8>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8260c9b4 r9:84e1ec00 r8:80200be4 r7:dfd61d54 r6:ffffffff r5:84e1ec00 r4:00000000 [<819bf798>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfd61d20 to 0xdfd61d68) 1d20: ec5e6000 ecfd7000 00000001 80239a78 7f029000 00000001 828b51c4 828b45a0 1d40: 7f029000 ecfd7000 8260c9b4 dfd61d9c dfd61da0 dfd61d70 802309b0 80239a90 1d60: 80000013 ffffffff r5:80000013 r4:80239a90 [<8023094c>] (flush_tlb_kernel_range) from [<804e40e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:828b51e4 [<804e3e5c>] (__purge_vmap_area_lazy) from [<804e4498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd61dc0 r5:dfd61e08 r4:dfd61dc0 [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a2c0 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:84e1ec00 r7:00000000 r6:82c18200 r5:00001000 r4:7f045000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdcb000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84185b8c r4:84185800 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:84185b8c r4:84d41f00 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e1ec00 r8:84d41f2c r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d41f00 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d41f00 r8:8027e8dc r7:dfd55e60 r6:84eb8780 r5:84e1ec00 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd61fb0 to 0xdfd61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84ebc6c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:74:4113 blocked for more than 430 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:74 state:D stack:0 pid:4113 tgid:4113 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf3a4>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<819be41c>] (__schedule) from [<819bf3a4>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82718544 r9:dff01d84 r8:00000002 r7:60000113 r6:dff01d8c r5:84e16000 r4:84e16000 [<819bf378>] (schedule) from [<819bf78c>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:84e16000 r4:82718540 [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<819c1b70>] (__mutex_lock.constprop.0) from [<819c233c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8260c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff01e08 r4:00000000 [<819c2328>] (__mutex_lock_slowpath) from [<819c237c>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<819c2340>] (mutex_lock) from [<804e431c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eaeac0 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:84e16000 r7:00000000 r6:82c18200 r5:00001000 r4:7f06d000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff25000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847ccf8c r4:847ccc00 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:847ccf8c r4:84d40200 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e16000 r8:84d4022c r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d40200 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d40200 r8:8027e8dc r7:dfd7de60 r6:84eb8c00 r5:84e16000 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff01fb0 to 0xdff01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84eaea40 INFO: task kworker/1:74:4113 is blocked on a mutex likely owned by task kworker/1:66:4095. task:kworker/1:66 state:R running task stack:0 pid:4095 tgid:4095 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf7d8>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8260c9b4 r9:84e1ec00 r8:80200be4 r7:dfd61d54 r6:ffffffff r5:84e1ec00 r4:00000000 [<819bf798>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfd61d20 to 0xdfd61d68) 1d20: eca2b000 ecfd7000 00000001 80239a78 7f029000 00000001 828b51c4 828b45a0 1d40: 7f029000 ecfd7000 8260c9b4 dfd61d9c dfd61da0 dfd61d70 802309b0 80239a90 1d60: 80000013 ffffffff r5:80000013 r4:80239a90 [<8023094c>] (flush_tlb_kernel_range) from [<804e40e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:828b51e4 [<804e3e5c>] (__purge_vmap_area_lazy) from [<804e4498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd61dc0 r5:dfd61e08 r4:dfd61dc0 [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a2c0 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:84e1ec00 r7:00000000 r6:82c18200 r5:00001000 r4:7f045000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdcb000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84185b8c r4:84185800 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:84185b8c r4:84d41f00 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e1ec00 r8:84d41f2c r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d41f00 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d41f00 r8:8027e8dc r7:dfd55e60 r6:84eb8780 r5:84e1ec00 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd61fb0 to 0xdfd61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84ebc6c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:75:4115 blocked for more than 430 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:75 state:D stack:0 pid:4115 tgid:4115 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf3a4>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<819be41c>] (__schedule) from [<819bf3a4>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82718544 r9:dff2dd84 r8:00000002 r7:60000113 r6:dff2dd8c r5:84e13c00 r4:84e13c00 [<819bf378>] (schedule) from [<819bf78c>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:84e13c00 r4:82718540 [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<819c1b70>] (__mutex_lock.constprop.0) from [<819c233c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8260c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff2de08 r4:00000000 [<819c2328>] (__mutex_lock_slowpath) from [<819c237c>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<819c2340>] (mutex_lock) from [<804e431c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eaed00 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:84e13c00 r7:00000000 r6:82c18200 r5:00001000 r4:7f06f000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff3f000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84187b8c r4:84187800 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:84187b8c r4:84d40280 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e13c00 r8:84d402ac r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d40280 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d40280 r8:8027e8dc r7:dff01e60 r6:84eb8c80 r5:84e13c00 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff2dfb0 to 0xdff2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84eae300 INFO: task kworker/1:75:4115 is blocked on a mutex likely owned by task kworker/1:66:4095. task:kworker/1:66 state:R running task stack:0 pid:4095 tgid:4095 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf7d8>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8260c9b4 r9:84e1ec00 r8:80200be4 r7:dfd61d54 r6:ffffffff r5:84e1ec00 r4:00000000 [<819bf798>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfd61d20 to 0xdfd61d68) 1d20: eca2b000 ecfd7000 00000001 80239a78 7f029000 00000001 828b51c4 828b45a0 1d40: 7f029000 ecfd7000 8260c9b4 dfd61d9c dfd61da0 dfd61d70 802309b0 80239a90 1d60: 80000013 ffffffff r5:80000013 r4:80239a90 [<8023094c>] (flush_tlb_kernel_range) from [<804e40e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:828b51e4 [<804e3e5c>] (__purge_vmap_area_lazy) from [<804e4498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd61dc0 r5:dfd61e08 r4:dfd61dc0 [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a2c0 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:84e1ec00 r7:00000000 r6:82c18200 r5:00001000 r4:7f045000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdcb000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84185b8c r4:84185800 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:84185b8c r4:84d41f00 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e1ec00 r8:84d41f2c r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d41f00 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d41f00 r8:8027e8dc r7:dfd55e60 r6:84eb8780 r5:84e1ec00 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd61fb0 to 0xdfd61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84ebc6c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:76:4117 blocked for more than 430 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:76 state:D stack:0 pid:4117 tgid:4117 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf3a4>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<819be41c>] (__schedule) from [<819bf3a4>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82718544 r9:dff4dd84 r8:00000002 r7:60000013 r6:dff4dd8c r5:84e10000 r4:84e10000 [<819bf378>] (schedule) from [<819bf78c>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:84e10000 r4:82718540 [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<819c1b70>] (__mutex_lock.constprop.0) from [<819c233c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8260c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff4de08 r4:00000000 [<819c2328>] (__mutex_lock_slowpath) from [<819c237c>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<819c2340>] (mutex_lock) from [<804e431c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eaf080 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:84e10000 r7:00000000 r6:82c18200 r5:00001000 r4:7f053000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc99000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84187f8c r4:84187c00 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:84187f8c r4:84d40300 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e10000 r8:84d4032c r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d40300 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d40300 r8:8027e8dc r7:dff2de60 r6:84eb8e00 r5:84e10000 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff4dfb0 to 0xdff4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84eaec40 INFO: task kworker/1:76:4117 is blocked on a mutex likely owned by task kworker/1:66:4095. task:kworker/1:66 state:R running task stack:0 pid:4095 tgid:4095 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf7d8>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8260c9b4 r9:84e1ec00 r8:80200be4 r7:dfd61d54 r6:ffffffff r5:84e1ec00 r4:00000000 [<819bf798>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfd61d20 to 0xdfd61d68) 1d20: eccec000 ecfd7000 00000001 80239a78 7f029000 00000001 828b51c4 828b45a0 1d40: 7f029000 ecfd7000 8260c9b4 dfd61d9c dfd61da0 dfd61d70 802309b0 80239a90 1d60: 80000013 ffffffff r5:80000013 r4:80239a90 [<8023094c>] (flush_tlb_kernel_range) from [<804e40e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:828b51e4 [<804e3e5c>] (__purge_vmap_area_lazy) from [<804e4498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd61dc0 r5:dfd61e08 r4:dfd61dc0 [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a2c0 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:84e1ec00 r7:00000000 r6:82c18200 r5:00001000 r4:7f045000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdcb000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84185b8c r4:84185800 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:84185b8c r4:84d41f00 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e1ec00 r8:84d41f2c r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d41f00 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d41f00 r8:8027e8dc r7:dfd55e60 r6:84eb8780 r5:84e1ec00 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd61fb0 to 0xdfd61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84ebc6c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:77:4118 blocked for more than 430 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:77 state:D stack:0 pid:4118 tgid:4118 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf3a4>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<819be41c>] (__schedule) from [<819bf3a4>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82718544 r9:dff5dd84 r8:00000002 r7:60000113 r6:dff5dd8c r5:84e16c00 r4:84e16c00 [<819bf378>] (schedule) from [<819bf78c>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:84e16c00 r4:82718540 [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<819c1b70>] (__mutex_lock.constprop.0) from [<819c233c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8260c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff5de08 r4:00000000 [<819c2328>] (__mutex_lock_slowpath) from [<819c237c>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<819c2340>] (mutex_lock) from [<804e431c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ebe940 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:84e16c00 r7:00000000 r6:82c18200 r5:00001000 r4:7f04f000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc1d000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e9ab8c r4:84e9a800 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:84e9ab8c r4:84d40380 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e16c00 r8:84d403ac r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d40380 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d40380 r8:8027e8dc r7:dff4de60 r6:84eb8e80 r5:84e16c00 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff5dfb0 to 0xdff5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84eae300 INFO: task kworker/1:77:4118 is blocked on a mutex likely owned by task kworker/1:66:4095. task:kworker/1:66 state:R running task stack:0 pid:4095 tgid:4095 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf7d8>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8260c9b4 r9:84e1ec00 r8:80200be4 r7:dfd61d54 r6:ffffffff r5:84e1ec00 r4:00000000 [<819bf798>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfd61d20 to 0xdfd61d68) 1d20: ecfd0000 ecfd7000 00000001 80239a78 7f029000 00000001 828b51c4 828b45a0 1d40: 7f029000 ecfd7000 8260c9b4 dfd61d9c dfd61da0 dfd61d70 802309b0 80239a90 1d60: 80000013 ffffffff r5:80000013 r4:80239a90 [<8023094c>] (flush_tlb_kernel_range) from [<804e40e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:828b51e4 [<804e3e5c>] (__purge_vmap_area_lazy) from [<804e4498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd61dc0 r5:dfd61e08 r4:dfd61dc0 [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a2c0 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:84e1ec00 r7:00000000 r6:82c18200 r5:00001000 r4:7f045000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdcb000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84185b8c r4:84185800 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:84185b8c r4:84d41f00 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e1ec00 r8:84d41f2c r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d41f00 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d41f00 r8:8027e8dc r7:dfd55e60 r6:84eb8780 r5:84e1ec00 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd61fb0 to 0xdfd61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84ebc6c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:37:4121 blocked for more than 430 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:37 state:D stack:0 pid:4121 tgid:4121 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf3a4>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<819be41c>] (__schedule) from [<819bf3a4>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82718544 r9:dfa41d84 r8:00000002 r7:60000113 r6:dfa41d8c r5:84df0c00 r4:84df0c00 [<819bf378>] (schedule) from [<819bf78c>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:84df0c00 r4:82718540 [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<819c1b70>] (__mutex_lock.constprop.0) from [<819c233c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8260c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa41e08 r4:00000000 [<819c2328>] (__mutex_lock_slowpath) from [<819c237c>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<819c2340>] (mutex_lock) from [<804e431c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ead240 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18005 r8:84df0c00 r7:00000000 r6:82c18000 r5:00001000 r4:7f02d000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa8d000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e9838c r4:84e98000 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:82c18000 r5:84e9838c r4:84eb8d80 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84df0c00 r8:84eb8dac r7:82604d40 r6:dddced40 r5:dddced60 r4:84eb8d80 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eb8d80 r8:8027e8dc r7:dfc2de60 r6:84eb8f00 r5:84df0c00 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa41fb0 to 0xdfa41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84692280 INFO: task kworker/0:37:4121 is blocked on a mutex likely owned by task kworker/1:69:4104. task:kworker/1:69 state:R running task stack:0 pid:4104 tgid:4104 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf7d8>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8260c9b4 r9:84e12400 r8:80200be4 r7:dfe59d54 r6:ffffffff r5:84e12400 r4:00000000 [<819bf798>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfe59d20 to 0xdfe59d68) 9d20: 7f206000 ed03d000 00000001 80239a78 7f00b000 00000001 828b51c4 828b45a0 9d40: 7f00b000 ed03d000 8260c9b4 dfe59d9c dfe59da0 dfe59d70 802309b0 80239a90 9d60: 90070013 ffffffff r5:90070013 r4:80239a90 [<8023094c>] (flush_tlb_kernel_range) from [<804e40e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:828b51e4 [<804e3e5c>] (__purge_vmap_area_lazy) from [<804e4498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe59dc0 r5:dfe59e08 r4:dfe59dc0 [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ebc380 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:84e12400 r7:00000000 r6:82c18200 r5:00001000 r4:7f061000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe3d000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8418638c r4:84186000 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:8418638c r4:84d41480 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e12400 r8:84d414ac r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d41480 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d41480 r8:8027e8dc r7:dfd79e60 r6:84eb8880 r5:84e12400 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe59fb0 to 0xdfe59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84ebc440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:38:4122 blocked for more than 430 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:38 state:D stack:0 pid:4122 tgid:4122 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf3a4>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<819be41c>] (__schedule) from [<819bf3a4>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82718544 r9:dfa61d84 r8:00000002 r7:60000013 r6:dfa61d8c r5:84df1800 r4:84df1800 [<819bf378>] (schedule) from [<819bf78c>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:84df1800 r4:82718540 [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<819c1b70>] (__mutex_lock.constprop.0) from [<819c233c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8260c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa61e08 r4:00000000 [<819c2328>] (__mutex_lock_slowpath) from [<819c237c>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<819c2340>] (mutex_lock) from [<804e431c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e9200 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18005 r8:84df1800 r7:00000000 r6:82c18000 r5:00001000 r4:7f02f000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa9b000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e9878c r4:84e98400 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:82c18000 r5:84e9878c r4:84eb8f80 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84df1800 r8:84eb8fac r7:82604d40 r6:dddced40 r5:dddced60 r4:84eb8f80 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eb8f80 r8:8027e8dc r7:dfa41e60 r6:84eb8d00 r5:84df1800 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa61fb0 to 0xdfa61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84d33f40 INFO: task kworker/0:38:4122 is blocked on a mutex likely owned by task kworker/1:69:4104. task:kworker/1:69 state:R running task stack:0 pid:4104 tgid:4104 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf7d8>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8260c9b4 r9:84e12400 r8:80200be4 r7:dfe59d54 r6:ffffffff r5:84e12400 r4:00000000 [<819bf798>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfe59d20 to 0xdfe59d68) 9d20: 7f50f000 ed03d000 00000001 80239a78 7f00b000 00000001 828b51c4 828b45a0 9d40: 7f00b000 ed03d000 8260c9b4 dfe59d9c dfe59da0 dfe59d70 802309b0 80239a90 9d60: 90070013 ffffffff r5:90070013 r4:80239a90 [<8023094c>] (flush_tlb_kernel_range) from [<804e40e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:828b51e4 [<804e3e5c>] (__purge_vmap_area_lazy) from [<804e4498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe59dc0 r5:dfe59e08 r4:dfe59dc0 [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ebc380 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:84e12400 r7:00000000 r6:82c18200 r5:00001000 r4:7f061000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe3d000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8418638c r4:84186000 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:8418638c r4:84d41480 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e12400 r8:84d414ac r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d41480 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d41480 r8:8027e8dc r7:dfd79e60 r6:84eb8880 r5:84e12400 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe59fb0 to 0xdfe59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84ebc440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:39:4125 blocked for more than 430 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:39 state:D stack:0 pid:4125 tgid:4125 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf3a4>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<819be41c>] (__schedule) from [<819bf3a4>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82718544 r9:dff29d84 r8:00000002 r7:60000013 r6:dff29d8c r5:84df3000 r4:84df3000 [<819bf378>] (schedule) from [<819bf78c>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:84df3000 r4:82718540 [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<819c1b70>] (__mutex_lock.constprop.0) from [<819c233c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8260c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff29e08 r4:00000000 [<819c2328>] (__mutex_lock_slowpath) from [<819c237c>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<819c2340>] (mutex_lock) from [<804e431c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a500 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18005 r8:84df3000 r7:00000000 r6:82c18000 r5:00001000 r4:7f035000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb01000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e98f8c r4:84e98c00 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:82c18000 r5:84e98f8c r4:84eb8500 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84df3000 r8:84eb852c r7:82604d40 r6:dddced40 r5:dddced60 r4:84eb8500 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eb8500 r8:8027e8dc r7:dfc2de60 r6:84eb8380 r5:84df3000 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff29fb0 to 0xdff29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84ead140 INFO: task kworker/0:39:4125 is blocked on a mutex likely owned by task kworker/1:69:4104. task:kworker/1:69 state:R running task stack:0 pid:4104 tgid:4104 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf7d8>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8260c9b4 r9:84e12400 r8:80200be4 r7:dfe59d54 r6:ffffffff r5:84e12400 r4:00000000 [<819bf798>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfe59d20 to 0xdfe59d68) 9d20: 7f781000 ed03d000 00000001 80239a78 7f00b000 00000001 828b51c4 828b45a0 9d40: 7f00b000 ed03d000 8260c9b4 dfe59d9c dfe59da0 dfe59d70 802309b0 80239a90 9d60: 90070013 ffffffff r5:90070013 r4:80239a90 [<8023094c>] (flush_tlb_kernel_range) from [<804e40e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:828b51e4 [<804e3e5c>] (__purge_vmap_area_lazy) from [<804e4498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe59dc0 r5:dfe59e08 r4:dfe59dc0 [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ebc380 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:84e12400 r7:00000000 r6:82c18200 r5:00001000 r4:7f061000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe3d000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8418638c r4:84186000 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:8418638c r4:84d41480 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e12400 r8:84d414ac r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d41480 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d41480 r8:8027e8dc r7:dfd79e60 r6:84eb8880 r5:84e12400 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe59fb0 to 0xdfe59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84ebc440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:40:4126 blocked for more than 430 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:40 state:D stack:0 pid:4126 tgid:4126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf3a4>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<819be41c>] (__schedule) from [<819bf3a4>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82718544 r9:dfa91d84 r8:00000002 r7:60000013 r6:dfa91d8c r5:84df3c00 r4:84df3c00 [<819bf378>] (schedule) from [<819bf78c>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:84df3c00 r4:82718540 [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<819c1b70>] (__mutex_lock.constprop.0) from [<819c233c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8260c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa91e08 r4:00000000 [<819c2328>] (__mutex_lock_slowpath) from [<819c237c>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<819c2340>] (mutex_lock) from [<804e431c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d43f00 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18005 r8:84df3c00 r7:00000000 r6:82c18000 r5:00001000 r4:7f037000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb1b000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e9938c r4:84e99000 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:82c18000 r5:84e9938c r4:84ec0000 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84df3c00 r8:84ec002c r7:82604d40 r6:dddced40 r5:dddced60 r4:84ec0000 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ec0000 r8:8027e8dc r7:dfc2de60 r6:84ec0080 r5:84df3c00 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa91fb0 to 0xdfa91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84ebc440 INFO: task kworker/0:40:4126 is blocked on a mutex likely owned by task kworker/1:69:4104. task:kworker/1:69 state:R running task stack:0 pid:4104 tgid:4104 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf7d8>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8260c9b4 r9:84e12400 r8:80200be4 r7:dfe59d54 r6:ffffffff r5:84e12400 r4:00000000 [<819bf798>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfe59d20 to 0xdfe59d68) 9d20: 7fa86000 ed03d000 00000001 80239a78 7f00b000 00000001 828b51c4 828b45a0 9d40: 7f00b000 ed03d000 8260c9b4 dfe59d9c dfe59da0 dfe59d70 802309b0 80239a90 9d60: 90070013 ffffffff r5:90070013 r4:80239a90 [<8023094c>] (flush_tlb_kernel_range) from [<804e40e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:828b51e4 [<804e3e5c>] (__purge_vmap_area_lazy) from [<804e4498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe59dc0 r5:dfe59e08 r4:dfe59dc0 [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ebc380 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:84e12400 r7:00000000 r6:82c18200 r5:00001000 r4:7f061000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe3d000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8418638c r4:84186000 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:8418638c r4:84d41480 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e12400 r8:84d414ac r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d41480 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d41480 r8:8027e8dc r7:dfd79e60 r6:84eb8880 r5:84e12400 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe59fb0 to 0xdfe59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84ebc440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:78:4127 blocked for more than 431 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:78 state:D stack:0 pid:4127 tgid:4127 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf3a4>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<819be41c>] (__schedule) from [<819bf3a4>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82718544 r9:dfd01d84 r8:00000002 r7:60000113 r6:dfd01d8c r5:845d6000 r4:845d6000 [<819bf378>] (schedule) from [<819bf78c>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:845d6000 r4:82718540 [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<819c1b70>] (__mutex_lock.constprop.0) from [<819c233c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8260c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd01e08 r4:00000000 [<819c2328>] (__mutex_lock_slowpath) from [<819c237c>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<819c2340>] (mutex_lock) from [<804e431c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8469bf80 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:845d6000 r7:00000000 r6:82c18200 r5:00001000 r4:7f051000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc81000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e9b38c r4:84e9b000 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:84e9b38c r4:84d40400 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:845d6000 r8:84d4042c r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d40400 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d40400 r8:8027e8dc r7:dff5de60 r6:84d40480 r5:845d6000 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd01fb0 to 0xdfd01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84eae240 INFO: task kworker/1:78:4127 is blocked on a mutex likely owned by task kworker/1:69:4104. task:kworker/1:69 state:R running task stack:0 pid:4104 tgid:4104 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf7d8>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8260c9b4 r9:84e12400 r8:80200be4 r7:dfe59d54 r6:ffffffff r5:84e12400 r4:00000000 [<819bf798>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfe59d20 to 0xdfe59d68) 9d20: 81587000 ed03d000 00000001 80239a78 7f00b000 00000001 828b51c4 828b45a0 9d40: 7f00b000 ed03d000 8260c9b4 dfe59d9c dfe59da0 dfe59d70 802309b0 80239a90 9d60: 80070013 ffffffff r5:80070013 r4:80239a90 [<8023094c>] (flush_tlb_kernel_range) from [<804e40e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:828b51e4 [<804e3e5c>] (__purge_vmap_area_lazy) from [<804e4498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe59dc0 r5:dfe59e08 r4:dfe59dc0 [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ebc380 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:84e12400 r7:00000000 r6:82c18200 r5:00001000 r4:7f061000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe3d000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8418638c r4:84186000 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:8418638c r4:84d41480 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e12400 r8:84d414ac r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d41480 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d41480 r8:8027e8dc r7:dfd79e60 r6:84eb8880 r5:84e12400 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe59fb0 to 0xdfe59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84ebc440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:41:4130 blocked for more than 431 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:41 state:D stack:0 pid:4130 tgid:4130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf3a4>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<819be41c>] (__schedule) from [<819bf3a4>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82718544 r9:dfb19d84 r8:00000002 r7:60000113 r6:dfb19d8c r5:84df5400 r4:84df5400 [<819bf378>] (schedule) from [<819bf78c>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:84df5400 r4:82718540 [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<819c1b70>] (__mutex_lock.constprop.0) from [<819c233c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8260c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb19e08 r4:00000000 [<819c2328>] (__mutex_lock_slowpath) from [<819c237c>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<819c2340>] (mutex_lock) from [<804e431c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d440c0 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18005 r8:84df5400 r7:00000000 r6:82c18000 r5:00001000 r4:7f039000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb5d000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e9978c r4:84e99400 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:82c18000 r5:84e9978c r4:84ec0100 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84df5400 r8:84ec012c r7:82604d40 r6:dddced40 r5:dddced60 r4:84ec0100 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ec0100 r8:8027e8dc r7:dfc2de60 r6:84ec0180 r5:84df5400 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb19fb0 to 0xdfb19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84eb7ac0 INFO: task kworker/0:41:4130 is blocked on a mutex likely owned by task kworker/1:69:4104. task:kworker/1:69 state:R running task stack:0 pid:4104 tgid:4104 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf7d8>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8260c9b4 r9:84e12400 r8:80200be4 r7:dfe59d54 r6:ffffffff r5:84e12400 r4:00000000 [<819bf798>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfe59d20 to 0xdfe59d68) 9d20: 81587000 ed03d000 00000001 80239a78 7f00b000 00000001 828b51c4 828b45a0 9d40: 7f00b000 ed03d000 8260c9b4 dfe59d9c dfe59da0 dfe59d70 802309b0 80239a90 9d60: 80070013 ffffffff r5:80070013 r4:80239a90 [<8023094c>] (flush_tlb_kernel_range) from [<804e40e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:828b51e4 [<804e3e5c>] (__purge_vmap_area_lazy) from [<804e4498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe59dc0 r5:dfe59e08 r4:dfe59dc0 [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ebc380 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:84e12400 r7:00000000 r6:82c18200 r5:00001000 r4:7f061000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe3d000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8418638c r4:84186000 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:8418638c r4:84d41480 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e12400 r8:84d414ac r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d41480 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d41480 r8:8027e8dc r7:dfd79e60 r6:84eb8880 r5:84e12400 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe59fb0 to 0xdfe59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84ebc440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:42:4133 blocked for more than 431 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:42 state:D stack:0 pid:4133 tgid:4133 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf3a4>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<819be41c>] (__schedule) from [<819bf3a4>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82718544 r9:dfb9dd84 r8:00000002 r7:60000113 r6:dfb9dd8c r5:84df6c00 r4:84df6c00 [<819bf378>] (schedule) from [<819bf78c>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:84df6c00 r4:82718540 [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<819c1b70>] (__mutex_lock.constprop.0) from [<819c233c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8260c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb9de08 r4:00000000 [<819c2328>] (__mutex_lock_slowpath) from [<819c237c>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<819c2340>] (mutex_lock) from [<804e431c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844349c0 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18005 r8:84df6c00 r7:00000000 r6:82c18000 r5:00001000 r4:7f047000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb6f000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e99b8c r4:84e99800 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:82c18000 r5:84e99b8c r4:84ec0200 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84df6c00 r8:84ec022c r7:82604d40 r6:dddced40 r5:dddced60 r4:84ec0200 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ec0200 r8:8027e8dc r7:dfc2de60 r6:84ec0280 r5:84df6c00 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb9dfb0 to 0xdfb9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84d43980 INFO: task kworker/0:42:4133 is blocked on a mutex likely owned by task kworker/1:69:4104. task:kworker/1:69 state:R running task stack:0 pid:4104 tgid:4104 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf7d8>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8260c9b4 r9:84e12400 r8:80200be4 r7:dfe59d54 r6:ffffffff r5:84e12400 r4:00000000 [<819bf798>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfe59d20 to 0xdfe59d68) 9d20: 81657000 ed03d000 00000001 80239a78 7f00b000 00000001 828b51c4 828b45a0 9d40: 7f00b000 ed03d000 8260c9b4 dfe59d9c dfe59da0 dfe59d70 802309b0 80239a90 9d60: 80070013 ffffffff r5:80070013 r4:80239a90 [<8023094c>] (flush_tlb_kernel_range) from [<804e40e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:828b51e4 [<804e3e5c>] (__purge_vmap_area_lazy) from [<804e4498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe59dc0 r5:dfe59e08 r4:dfe59dc0 [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ebc380 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:84e12400 r7:00000000 r6:82c18200 r5:00001000 r4:7f061000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe3d000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8418638c r4:84186000 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:8418638c r4:84d41480 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e12400 r8:84d414ac r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d41480 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d41480 r8:8027e8dc r7:dfd79e60 r6:84eb8880 r5:84e12400 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe59fb0 to 0xdfe59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84ebc440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:43:4134 blocked for more than 431 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:43 state:D stack:0 pid:4134 tgid:4134 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf3a4>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<819be41c>] (__schedule) from [<819bf3a4>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82718544 r9:dfb15d84 r8:00000002 r7:60000113 r6:dfb15d8c r5:84df4800 r4:84df4800 [<819bf378>] (schedule) from [<819bf78c>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:84df4800 r4:82718540 [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<819c1b70>] (__mutex_lock.constprop.0) from [<819c233c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8260c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb15e08 r4:00000000 [<819c2328>] (__mutex_lock_slowpath) from [<819c237c>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<819c2340>] (mutex_lock) from [<804e431c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ebe040 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18005 r8:84df4800 r7:00000000 r6:82c18000 r5:00001000 r4:7f049000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbb1000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e99f8c r4:84e99c00 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:82c18000 r5:84e99f8c r4:84ec0300 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84df4800 r8:84ec032c r7:82604d40 r6:dddced40 r5:dddced60 r4:84ec0300 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ec0300 r8:8027e8dc r7:dfc2de60 r6:84ec0380 r5:84df4800 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb15fb0 to 0xdfb15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84d44c40 INFO: task kworker/0:43:4134 is blocked on a mutex likely owned by task kworker/1:69:4104. task:kworker/1:69 state:R running task stack:0 pid:4104 tgid:4104 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf7d8>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8260c9b4 r9:84e12400 r8:80200be4 r7:dfe59d54 r6:ffffffff r5:84e12400 r4:00000000 [<819bf798>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfe59d20 to 0xdfe59d68) 9d20: 818cb000 ed03d000 00000001 80239a78 7f00b000 00000001 828b51c4 828b45a0 9d40: 7f00b000 ed03d000 8260c9b4 dfe59d9c dfe59da0 dfe59d70 802309b0 80239a90 9d60: 80070013 ffffffff r5:80070013 r4:80239a90 [<8023094c>] (flush_tlb_kernel_range) from [<804e40e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:828b51e4 [<804e3e5c>] (__purge_vmap_area_lazy) from [<804e4498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe59dc0 r5:dfe59e08 r4:dfe59dc0 [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ebc380 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:84e12400 r7:00000000 r6:82c18200 r5:00001000 r4:7f061000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe3d000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8418638c r4:84186000 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:8418638c r4:84d41480 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e12400 r8:84d414ac r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d41480 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d41480 r8:8027e8dc r7:dfd79e60 r6:84eb8880 r5:84e12400 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe59fb0 to 0xdfe59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84ebc440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:44:4137 blocked for more than 431 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:44 state:D stack:0 pid:4137 tgid:4137 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf3a4>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<819be41c>] (__schedule) from [<819bf3a4>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82718544 r9:dfb61d84 r8:00000002 r7:60000113 r6:dfb61d8c r5:84df2400 r4:84df2400 [<819bf378>] (schedule) from [<819bf78c>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:84df2400 r4:82718540 [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<819c1b70>] (__mutex_lock.constprop.0) from [<819c233c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8260c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb61e08 r4:00000000 [<819c2328>] (__mutex_lock_slowpath) from [<819c237c>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<819c2340>] (mutex_lock) from [<804e431c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ebe6c0 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18005 r8:84df2400 r7:00000000 r6:82c18000 r5:00001000 r4:7f04d000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbff000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e9a78c r4:84e9a400 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:82c18000 r5:84e9a78c r4:84ec0480 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84df2400 r8:84ec04ac r7:82604d40 r6:dddced40 r5:dddced60 r4:84ec0480 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ec0480 r8:8027e8dc r7:dfc2de60 r6:84ec0500 r5:84df2400 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb61fb0 to 0xdfb61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84ebe100 INFO: task kworker/0:44:4137 is blocked on a mutex likely owned by task kworker/1:69:4104. task:kworker/1:69 state:R running task stack:0 pid:4104 tgid:4104 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf7d8>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8260c9b4 r9:84e12400 r8:80200be4 r7:dfe59d54 r6:ffffffff r5:84e12400 r4:00000000 [<819bf798>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfe59d20 to 0xdfe59d68) 9d20: 818cb000 ed03d000 00000001 80239a78 7f00b000 00000001 828b51c4 828b45a0 9d40: 7f00b000 ed03d000 8260c9b4 dfe59d9c dfe59da0 dfe59d70 802309b0 80239a90 9d60: 80070013 ffffffff r5:80070013 r4:80239a90 [<8023094c>] (flush_tlb_kernel_range) from [<804e40e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:828b51e4 [<804e3e5c>] (__purge_vmap_area_lazy) from [<804e4498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe59dc0 r5:dfe59e08 r4:dfe59dc0 [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ebc380 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:84e12400 r7:00000000 r6:82c18200 r5:00001000 r4:7f061000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe3d000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8418638c r4:84186000 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:8418638c r4:84d41480 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e12400 r8:84d414ac r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d41480 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d41480 r8:8027e8dc r7:dfd79e60 r6:84eb8880 r5:84e12400 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe59fb0 to 0xdfe59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84ebc440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:45:4139 blocked for more than 431 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:45 state:D stack:0 pid:4139 tgid:4139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf3a4>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<819be41c>] (__schedule) from [<819bf3a4>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82718544 r9:dfbb9d84 r8:00000002 r7:60000013 r6:dfbb9d8c r5:84df6000 r4:84df6000 [<819bf378>] (schedule) from [<819bf78c>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:84df6000 r4:82718540 [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<819c1b70>] (__mutex_lock.constprop.0) from [<819c233c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8260c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb9e08 r4:00000000 [<819c2328>] (__mutex_lock_slowpath) from [<819c237c>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<819c2340>] (mutex_lock) from [<804e431c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eaf680 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18005 r8:84df6000 r7:00000000 r6:82c18000 r5:00001000 r4:7f00d000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df983000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84185f8c r4:84185c00 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:82c18000 r5:84185f8c r4:84ec0400 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84df6000 r8:84ec042c r7:82604d40 r6:dddced40 r5:dddced60 r4:84ec0400 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ec0400 r8:8027e8dc r7:dfb61e60 r6:84ec0580 r5:84df6000 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbb9fb0 to 0xdfbb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84ebe200 INFO: task kworker/0:45:4139 is blocked on a mutex likely owned by task kworker/1:69:4104. task:kworker/1:69 state:R running task stack:0 pid:4104 tgid:4104 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf7d8>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8260c9b4 r9:84e12400 r8:80200be4 r7:dfe59d54 r6:ffffffff r5:84e12400 r4:00000000 [<819bf798>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfe59d20 to 0xdfe59d68) 9d20: 818cb000 ed03d000 00000001 80239a78 7f00b000 00000001 828b51c4 828b45a0 9d40: 7f00b000 ed03d000 8260c9b4 dfe59d9c dfe59da0 dfe59d70 802309b0 80239a90 9d60: 80070013 ffffffff r5:80070013 r4:80239a90 [<8023094c>] (flush_tlb_kernel_range) from [<804e40e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:828b51e4 [<804e3e5c>] (__purge_vmap_area_lazy) from [<804e4498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe59dc0 r5:dfe59e08 r4:dfe59dc0 [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ebc380 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:84e12400 r7:00000000 r6:82c18200 r5:00001000 r4:7f061000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe3d000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8418638c r4:84186000 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:8418638c r4:84d41480 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e12400 r8:84d414ac r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d41480 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d41480 r8:8027e8dc r7:dfd79e60 r6:84eb8880 r5:84e12400 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe59fb0 to 0xdfe59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84ebc440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:46:4141 blocked for more than 431 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:46 state:D stack:0 pid:4141 tgid:4141 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf3a4>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<819be41c>] (__schedule) from [<819bf3a4>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82718544 r9:dfc19d84 r8:00000002 r7:60000113 r6:dfc19d8c r5:84df0000 r4:84df0000 [<819bf378>] (schedule) from [<819bf78c>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:84df0000 r4:82718540 [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<819c1b70>] (__mutex_lock.constprop.0) from [<819c233c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8260c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc19e08 r4:00000000 [<819c2328>] (__mutex_lock_slowpath) from [<819c237c>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<819c2340>] (mutex_lock) from [<804e431c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eb3800 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18005 r8:84df0000 r7:00000000 r6:82c18000 r5:00001000 r4:7f03d000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd6d000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e9af8c r4:84e9ac00 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:82c18000 r5:84e9af8c r4:84ec0680 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84df0000 r8:84ec06ac r7:82604d40 r6:dddced40 r5:dddced60 r4:84ec0680 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ec0680 r8:8027e8dc r7:dfbb9e60 r6:84ec0700 r5:84df0000 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc19fb0 to 0xdfc19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84ebe580 INFO: task kworker/0:46:4141 is blocked on a mutex likely owned by task kworker/1:69:4104. task:kworker/1:69 state:R running task stack:0 pid:4104 tgid:4104 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf7d8>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8260c9b4 r9:84e12400 r8:80200be4 r7:dfe59d54 r6:ffffffff r5:84e12400 r4:00000000 [<819bf798>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfe59d20 to 0xdfe59d68) 9d20: 818cb000 ed03d000 00000001 80239a78 7f00b000 00000001 828b51c4 828b45a0 9d40: 7f00b000 ed03d000 8260c9b4 dfe59d9c dfe59da0 dfe59d70 802309b0 80239a90 9d60: 80070013 ffffffff r5:80070013 r4:80239a90 [<8023094c>] (flush_tlb_kernel_range) from [<804e40e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:828b51e4 [<804e3e5c>] (__purge_vmap_area_lazy) from [<804e4498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe59dc0 r5:dfe59e08 r4:dfe59dc0 [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ebc380 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:84e12400 r7:00000000 r6:82c18200 r5:00001000 r4:7f061000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe3d000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8418638c r4:84186000 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:8418638c r4:84d41480 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e12400 r8:84d414ac r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d41480 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d41480 r8:8027e8dc r7:dfd79e60 r6:84eb8880 r5:84e12400 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe59fb0 to 0xdfe59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84ebc440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:79:4144 blocked for more than 431 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:79 state:D stack:0 pid:4144 tgid:4144 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf3a4>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<819be41c>] (__schedule) from [<819bf3a4>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82718544 r9:dfcedd84 r8:00000002 r7:60000013 r6:dfcedd8c r5:84ee0c00 r4:84ee0c00 [<819bf378>] (schedule) from [<819bf78c>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:84ee0c00 r4:82718540 [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<819c1b70>] (__mutex_lock.constprop.0) from [<819c233c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8260c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcede08 r4:00000000 [<819c2328>] (__mutex_lock_slowpath) from [<819c237c>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<819c2340>] (mutex_lock) from [<804e431c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eafbc0 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:84ee0c00 r7:00000000 r6:82c18200 r5:00001000 r4:7f033000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd0b000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ce738c r4:84ce7000 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:84ce738c r4:84d40600 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ee0c00 r8:84d4062c r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d40600 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d40600 r8:8027e8dc r7:dff4de60 r6:84ec0780 r5:84ee0c00 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcedfb0 to 0xdfcedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84eaf140 INFO: task kworker/1:79:4144 is blocked on a mutex likely owned by task kworker/1:69:4104. task:kworker/1:69 state:R running task stack:0 pid:4104 tgid:4104 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf7d8>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8260c9b4 r9:84e12400 r8:80200be4 r7:dfe59d54 r6:ffffffff r5:84e12400 r4:00000000 [<819bf798>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfe59d20 to 0xdfe59d68) 9d20: 81cf0000 ed03d000 00000001 80239a78 7f00b000 00000001 828b51c4 828b45a0 9d40: 7f00b000 ed03d000 8260c9b4 dfe59d9c dfe59da0 dfe59d70 802309b0 80239a90 9d60: 80070013 ffffffff r5:80070013 r4:80239a90 [<8023094c>] (flush_tlb_kernel_range) from [<804e40e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:828b51e4 [<804e3e5c>] (__purge_vmap_area_lazy) from [<804e4498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe59dc0 r5:dfe59e08 r4:dfe59dc0 [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ebc380 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:84e12400 r7:00000000 r6:82c18200 r5:00001000 r4:7f061000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe3d000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8418638c r4:84186000 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:8418638c r4:84d41480 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e12400 r8:84d414ac r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d41480 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d41480 r8:8027e8dc r7:dfd79e60 r6:84eb8880 r5:84e12400 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe59fb0 to 0xdfe59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84ebc440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:80:4145 blocked for more than 431 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:80 state:D stack:0 pid:4145 tgid:4145 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf3a4>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<819be41c>] (__schedule) from [<819bf3a4>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82718544 r9:dfcf1d84 r8:00000002 r7:60000113 r6:dfcf1d8c r5:84ee0000 r4:84ee0000 [<819bf378>] (schedule) from [<819bf78c>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:84ee0000 r4:82718540 [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<819c1b70>] (__mutex_lock.constprop.0) from [<819c233c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8260c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcf1e08 r4:00000000 [<819c2328>] (__mutex_lock_slowpath) from [<819c237c>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<819c2340>] (mutex_lock) from [<804e431c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eaf9c0 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:84ee0000 r7:00000000 r6:82c18200 r5:00001000 r4:7f031000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9d000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e9bb8c r4:84e9b800 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:84e9bb8c r4:84d40580 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ee0000 r8:84d405ac r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d40580 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d40580 r8:8027e8dc r7:dfcede60 r6:84ec0800 r5:84ee0000 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcf1fb0 to 0xdfcf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84eaf2c0 INFO: task kworker/1:80:4145 is blocked on a mutex likely owned by task kworker/1:69:4104. task:kworker/1:69 state:R running task stack:0 pid:4104 tgid:4104 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf7d8>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8260c9b4 r9:84e12400 r8:80200be4 r7:dfe59d54 r6:ffffffff r5:84e12400 r4:00000000 [<819bf798>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfe59d20 to 0xdfe59d68) 9d20: 81cf0000 ed03d000 00000001 80239a78 7f00b000 00000001 828b51c4 828b45a0 9d40: 7f00b000 ed03d000 8260c9b4 dfe59d9c dfe59da0 dfe59d70 802309b0 80239a90 9d60: 80070013 ffffffff r5:80070013 r4:80239a90 [<8023094c>] (flush_tlb_kernel_range) from [<804e40e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:828b51e4 [<804e3e5c>] (__purge_vmap_area_lazy) from [<804e4498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe59dc0 r5:dfe59e08 r4:dfe59dc0 [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ebc380 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:84e12400 r7:00000000 r6:82c18200 r5:00001000 r4:7f061000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe3d000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8418638c r4:84186000 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:8418638c r4:84d41480 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e12400 r8:84d414ac r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d41480 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d41480 r8:8027e8dc r7:dfd79e60 r6:84eb8880 r5:84e12400 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe59fb0 to 0xdfe59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84ebc440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:47:4146 blocked for more than 431 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:47 state:D stack:0 pid:4146 tgid:4146 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf3a4>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<819be41c>] (__schedule) from [<819bf3a4>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82718544 r9:dff69d84 r8:00000002 r7:60000013 r6:dff69d8c r5:84ee1800 r4:84ee1800 [<819bf378>] (schedule) from [<819bf78c>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:84ee1800 r4:82718540 [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<819c1b70>] (__mutex_lock.constprop.0) from [<819c233c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8260c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff69e08 r4:00000000 [<819c2328>] (__mutex_lock_slowpath) from [<819c237c>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<819c2340>] (mutex_lock) from [<804e431c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eb3b40 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18005 r8:84ee1800 r7:00000000 r6:82c18000 r5:00001000 r4:7f03f000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd9f000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e98b8c r4:84e98800 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:82c18000 r5:84e98b8c r4:84ec0880 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ee1800 r8:84ec08ac r7:82604d40 r6:dddced40 r5:dddced60 r4:84ec0880 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ec0880 r8:8027e8dc r7:dfbb9e60 r6:84ec0900 r5:84ee1800 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff69fb0 to 0xdff69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84ebef80 INFO: task kworker/0:47:4146 is blocked on a mutex likely owned by task kworker/1:69:4104. task:kworker/1:69 state:R running task stack:0 pid:4104 tgid:4104 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf7d8>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8260c9b4 r9:84e12400 r8:80200be4 r7:dfe59d54 r6:ffffffff r5:84e12400 r4:00000000 [<819bf798>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfe59d20 to 0xdfe59d68) 9d20: 81cf0000 ed03d000 00000001 80239a78 7f00b000 00000001 828b51c4 828b45a0 9d40: 7f00b000 ed03d000 8260c9b4 dfe59d9c dfe59da0 dfe59d70 802309b0 80239a90 9d60: 80070013 ffffffff r5:80070013 r4:80239a90 [<8023094c>] (flush_tlb_kernel_range) from [<804e40e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:828b51e4 [<804e3e5c>] (__purge_vmap_area_lazy) from [<804e4498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe59dc0 r5:dfe59e08 r4:dfe59dc0 [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ebc380 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:84e12400 r7:00000000 r6:82c18200 r5:00001000 r4:7f061000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe3d000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8418638c r4:84186000 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:8418638c r4:84d41480 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e12400 r8:84d414ac r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d41480 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d41480 r8:8027e8dc r7:dfd79e60 r6:84eb8880 r5:84e12400 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe59fb0 to 0xdfe59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84ebc440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:48:4149 blocked for more than 431 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:48 state:D stack:0 pid:4149 tgid:4149 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf3a4>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<819be41c>] (__schedule) from [<819bf3a4>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82718544 r9:dff6dd84 r8:00000002 r7:60000113 r6:dff6dd8c r5:84ee3000 r4:84ee3000 [<819bf378>] (schedule) from [<819bf78c>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:84ee3000 r4:82718540 [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<819c1b70>] (__mutex_lock.constprop.0) from [<819c233c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8260c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff6de08 r4:00000000 [<819c2328>] (__mutex_lock_slowpath) from [<819c237c>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<819c2340>] (mutex_lock) from [<804e431c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eb3580 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18005 r8:84ee3000 r7:00000000 r6:82c18000 r5:00001000 r4:7f03b000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd4b000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e9bf8c r4:84e9bc00 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:82c18000 r5:84e9bf8c r4:84ec0980 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ee3000 r8:84ec09ac r7:82604d40 r6:dddced40 r5:dddced60 r4:84ec0980 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ec0980 r8:8027e8dc r7:dfc19e60 r6:84ec0a00 r5:84ee3000 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff6dfb0 to 0xdff6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84eaef80 INFO: task kworker/0:48:4149 is blocked on a mutex likely owned by task kworker/1:69:4104. task:kworker/1:69 state:R running task stack:0 pid:4104 tgid:4104 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf7d8>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8260c9b4 r9:84e12400 r8:80200be4 r7:dfe59d54 r6:ffffffff r5:84e12400 r4:00000000 [<819bf798>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfe59d20 to 0xdfe59d68) 9d20: 81cf0000 ed03d000 00000001 80239a78 7f00b000 00000001 828b51c4 828b45a0 9d40: 7f00b000 ed03d000 8260c9b4 dfe59d9c dfe59da0 dfe59d70 802309b0 80239a90 9d60: 80070013 ffffffff r5:80070013 r4:80239a90 [<8023094c>] (flush_tlb_kernel_range) from [<804e40e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:828b51e4 [<804e3e5c>] (__purge_vmap_area_lazy) from [<804e4498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe59dc0 r5:dfe59e08 r4:dfe59dc0 [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ebc380 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:84e12400 r7:00000000 r6:82c18200 r5:00001000 r4:7f061000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe3d000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8418638c r4:84186000 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:8418638c r4:84d41480 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e12400 r8:84d414ac r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d41480 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d41480 r8:8027e8dc r7:dfd79e60 r6:84eb8880 r5:84e12400 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe59fb0 to 0xdfe59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84ebc440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:81:4152 blocked for more than 431 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:81 state:D stack:0 pid:4152 tgid:4152 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf3a4>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<819be41c>] (__schedule) from [<819bf3a4>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82718544 r9:dfd1dd84 r8:00000002 r7:60000113 r6:dfd1dd8c r5:84ee4800 r4:84ee4800 [<819bf378>] (schedule) from [<819bf78c>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:84ee4800 r4:82718540 [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<819c1b70>] (__mutex_lock.constprop.0) from [<819c233c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8260c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd1de08 r4:00000000 [<819c2328>] (__mutex_lock_slowpath) from [<819c237c>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<819c2340>] (mutex_lock) from [<804e431c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eaf880 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:84ee4800 r7:00000000 r6:82c18200 r5:00001000 r4:7f045000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe3b000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ca478c r4:84ca4400 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:84ca478c r4:84d40700 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ee4800 r8:84d4072c r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d40700 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d40700 r8:8027e8dc r7:dfcede60 r6:84ec0a80 r5:84ee4800 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd1dfb0 to 0xdfd1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84eafb00 INFO: task kworker/1:81:4152 is blocked on a mutex likely owned by task kworker/1:69:4104. task:kworker/1:69 state:R running task stack:0 pid:4104 tgid:4104 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf7d8>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8260c9b4 r9:84e12400 r8:80200be4 r7:dfe59d54 r6:ffffffff r5:84e12400 r4:00000000 [<819bf798>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfe59d20 to 0xdfe59d68) 9d20: 81cf0000 ed03d000 00000001 80239a78 7f00b000 00000001 828b51c4 828b45a0 9d40: 7f00b000 ed03d000 8260c9b4 dfe59d9c dfe59da0 dfe59d70 802309b0 80239a90 9d60: 80070013 ffffffff r5:80070013 r4:80239a90 [<8023094c>] (flush_tlb_kernel_range) from [<804e40e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:828b51e4 [<804e3e5c>] (__purge_vmap_area_lazy) from [<804e4498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe59dc0 r5:dfe59e08 r4:dfe59dc0 [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ebc380 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:84e12400 r7:00000000 r6:82c18200 r5:00001000 r4:7f061000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe3d000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8418638c r4:84186000 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:8418638c r4:84d41480 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e12400 r8:84d414ac r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d41480 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d41480 r8:8027e8dc r7:dfd79e60 r6:84eb8880 r5:84e12400 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe59fb0 to 0xdfe59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84ebc440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:82:4153 blocked for more than 431 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:82 state:D stack:0 pid:4153 tgid:4153 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf3a4>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<819be41c>] (__schedule) from [<819bf3a4>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82718544 r9:dfd35d84 r8:00000002 r7:60000113 r6:dfd35d8c r5:84ee5400 r4:84ee5400 [<819bf378>] (schedule) from [<819bf78c>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:84ee5400 r4:82718540 [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<819c1b70>] (__mutex_lock.constprop.0) from [<819c233c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8260c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd35e08 r4:00000000 [<819c2328>] (__mutex_lock_slowpath) from [<819c237c>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<819c2340>] (mutex_lock) from [<804e431c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eb3200 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:84ee5400 r7:00000000 r6:82c18200 r5:00001000 r4:7f02f000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfabb000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84f2138c r4:84f21000 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:84f2138c r4:84d40680 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ee5400 r8:84d406ac r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d40680 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d40680 r8:8027e8dc r7:dfd1de60 r6:84ec0b80 r5:84ee5400 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd35fb0 to 0xdfd35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84eaf980 INFO: task kworker/1:82:4153 is blocked on a mutex likely owned by task kworker/1:69:4104. task:kworker/1:69 state:R running task stack:0 pid:4104 tgid:4104 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf7d8>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8260c9b4 r9:84e12400 r8:80200be4 r7:dfe59d54 r6:ffffffff r5:84e12400 r4:00000000 [<819bf798>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfe59d20 to 0xdfe59d68) 9d20: 81cf0000 ed03d000 00000001 80239a78 7f00b000 00000001 828b51c4 828b45a0 9d40: 7f00b000 ed03d000 8260c9b4 dfe59d9c dfe59da0 dfe59d70 802309b0 80239a90 9d60: 80070013 ffffffff r5:80070013 r4:80239a90 [<8023094c>] (flush_tlb_kernel_range) from [<804e40e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:828b51e4 [<804e3e5c>] (__purge_vmap_area_lazy) from [<804e4498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe59dc0 r5:dfe59e08 r4:dfe59dc0 [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ebc380 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:84e12400 r7:00000000 r6:82c18200 r5:00001000 r4:7f061000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe3d000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8418638c r4:84186000 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:8418638c r4:84d41480 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e12400 r8:84d414ac r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d41480 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d41480 r8:8027e8dc r7:dfd79e60 r6:84eb8880 r5:84e12400 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe59fb0 to 0xdfe59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84ebc440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:83:4157 blocked for more than 431 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:83 state:D stack:0 pid:4157 tgid:4157 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf3a4>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<819be41c>] (__schedule) from [<819bf3a4>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82718544 r9:dfda9d84 r8:00000002 r7:60000113 r6:dfda9d8c r5:84ee6c00 r4:84ee6c00 [<819bf378>] (schedule) from [<819bf78c>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:84ee6c00 r4:82718540 [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<819c1b70>] (__mutex_lock.constprop.0) from [<819c233c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8260c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfda9e08 r4:00000000 [<819c2328>] (__mutex_lock_slowpath) from [<819c237c>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<819c2340>] (mutex_lock) from [<804e431c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eaf4c0 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:84ee6c00 r7:00000000 r6:82c18200 r5:00001000 r4:7f043000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe21000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84f2078c r4:84f20400 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:84f2078c r4:84d40500 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ee6c00 r8:84d4052c r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d40500 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d40500 r8:8027e8dc r7:dfd1de60 r6:84ec0c80 r5:84ee6c00 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfda9fb0 to 0xdfda9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84eaf8c0 INFO: task kworker/1:83:4157 is blocked on a mutex likely owned by task kworker/1:69:4104. task:kworker/1:69 state:R running task stack:0 pid:4104 tgid:4104 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf7d8>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8260c9b4 r9:84e12400 r8:80200be4 r7:dfe59d54 r6:ffffffff r5:84e12400 r4:00000000 [<819bf798>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfe59d20 to 0xdfe59d68) 9d20: 81cf0000 ed03d000 00000001 80239a78 7f00b000 00000001 828b51c4 828b45a0 9d40: 7f00b000 ed03d000 8260c9b4 dfe59d9c dfe59da0 dfe59d70 802309b0 80239a90 9d60: 80070013 ffffffff r5:80070013 r4:80239a90 [<8023094c>] (flush_tlb_kernel_range) from [<804e40e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:828b51e4 [<804e3e5c>] (__purge_vmap_area_lazy) from [<804e4498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe59dc0 r5:dfe59e08 r4:dfe59dc0 [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ebc380 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:84e12400 r7:00000000 r6:82c18200 r5:00001000 r4:7f061000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe3d000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8418638c r4:84186000 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:8418638c r4:84d41480 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e12400 r8:84d414ac r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d41480 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d41480 r8:8027e8dc r7:dfd79e60 r6:84eb8880 r5:84e12400 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe59fb0 to 0xdfe59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84ebc440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:50:4160 blocked for more than 431 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:50 state:D stack:0 pid:4160 tgid:4160 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf3a4>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<819be41c>] (__schedule) from [<819bf3a4>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82718544 r9:dfdf1d84 r8:00000002 r7:60000113 r6:dfdf1d8c r5:84ef8000 r4:84ef8000 [<819bf378>] (schedule) from [<819bf78c>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:84ef8000 r4:82718540 [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<819c1b70>] (__mutex_lock.constprop.0) from [<819c233c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8260c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdf1e08 r4:00000000 [<819c2328>] (__mutex_lock_slowpath) from [<819c237c>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<819c2340>] (mutex_lock) from [<804e431c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eb3dc0 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18005 r8:84ef8000 r7:00000000 r6:82c18000 r5:00001000 r4:7f041000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdb5000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84f2038c r4:84f20000 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:82c18000 r5:84f2038c r4:84ec0d00 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ef8000 r8:84ec0d2c r7:82604d40 r6:dddced40 r5:dddced60 r4:84ec0d00 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ec0d00 r8:8027e8dc r7:dfd65e60 r6:84ec0d80 r5:84ef8000 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdf1fb0 to 0xdfdf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84eb3ac0 INFO: task kworker/0:50:4160 is blocked on a mutex likely owned by task kworker/1:69:4104. task:kworker/1:69 state:R running task stack:0 pid:4104 tgid:4104 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf7d8>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8260c9b4 r9:84e12400 r8:80200be4 r7:dfe59d54 r6:ffffffff r5:84e12400 r4:00000000 [<819bf798>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfe59d20 to 0xdfe59d68) 9d20: 81cf0000 ed03d000 00000001 80239a78 7f00b000 00000001 828b51c4 828b45a0 9d40: 7f00b000 ed03d000 8260c9b4 dfe59d9c dfe59da0 dfe59d70 802309b0 80239a90 9d60: 80070013 ffffffff r5:80070013 r4:80239a90 [<8023094c>] (flush_tlb_kernel_range) from [<804e40e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:828b51e4 [<804e3e5c>] (__purge_vmap_area_lazy) from [<804e4498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe59dc0 r5:dfe59e08 r4:dfe59dc0 [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ebc380 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:84e12400 r7:00000000 r6:82c18200 r5:00001000 r4:7f061000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe3d000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8418638c r4:84186000 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:8418638c r4:84d41480 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e12400 r8:84d414ac r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d41480 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d41480 r8:8027e8dc r7:dfd79e60 r6:84eb8880 r5:84e12400 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe59fb0 to 0xdfe59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84ebc440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:51:4161 blocked for more than 431 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:51 state:D stack:0 pid:4161 tgid:4161 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf3a4>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<819be41c>] (__schedule) from [<819bf3a4>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82718544 r9:dfcb9d84 r8:00000002 r7:60000113 r6:dfcb9d8c r5:84ef8c00 r4:84ef8c00 [<819bf378>] (schedule) from [<819bf78c>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:84ef8c00 r4:82718540 [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<819c1b70>] (__mutex_lock.constprop.0) from [<819c233c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8260c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcb9e08 r4:00000000 [<819c2328>] (__mutex_lock_slowpath) from [<819c237c>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<819c2340>] (mutex_lock) from [<804e431c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84692600 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18005 r8:84ef8c00 r7:00000000 r6:82c18000 r5:00001000 r4:7f02d000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa97000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84f20f8c r4:84f20c00 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:82c18000 r5:84f20f8c r4:84ec0e00 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ef8c00 r8:84ec0e2c r7:82604d40 r6:dddced40 r5:dddced60 r4:84ec0e00 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ec0e00 r8:8027e8dc r7:dfd65e60 r6:84ec0e80 r5:84ef8c00 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcb9fb0 to 0xdfcb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84eb3c00 INFO: task kworker/0:51:4161 is blocked on a mutex likely owned by task kworker/1:69:4104. task:kworker/1:69 state:R running task stack:0 pid:4104 tgid:4104 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf7d8>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8260c9b4 r9:84e12400 r8:80200be4 r7:dfe59d54 r6:ffffffff r5:84e12400 r4:00000000 [<819bf798>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfe59d20 to 0xdfe59d68) 9d20: 81cf0000 ed03d000 00000001 80239a78 7f00b000 00000001 828b51c4 828b45a0 9d40: 7f00b000 ed03d000 8260c9b4 dfe59d9c dfe59da0 dfe59d70 802309b0 80239a90 9d60: 80070013 ffffffff r5:80070013 r4:80239a90 [<8023094c>] (flush_tlb_kernel_range) from [<804e40e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:828b51e4 [<804e3e5c>] (__purge_vmap_area_lazy) from [<804e4498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe59dc0 r5:dfe59e08 r4:dfe59dc0 [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ebc380 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:84e12400 r7:00000000 r6:82c18200 r5:00001000 r4:7f061000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe3d000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8418638c r4:84186000 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:8418638c r4:84d41480 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e12400 r8:84d414ac r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d41480 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d41480 r8:8027e8dc r7:dfd79e60 r6:84eb8880 r5:84e12400 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe59fb0 to 0xdfe59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84ebc440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:84:4164 blocked for more than 431 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:84 state:D stack:0 pid:4164 tgid:4164 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf3a4>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<819be41c>] (__schedule) from [<819bf3a4>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82718544 r9:dfe65d84 r8:00000002 r7:60000113 r6:dfe65d8c r5:84ef9800 r4:84ef9800 [<819bf378>] (schedule) from [<819bf78c>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:84ef9800 r4:82718540 [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<819c1b70>] (__mutex_lock.constprop.0) from [<819c233c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8260c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe65e08 r4:00000000 [<819c2328>] (__mutex_lock_slowpath) from [<819c237c>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<819c2340>] (mutex_lock) from [<804e431c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eb9400 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:84ef9800 r7:00000000 r6:82c18200 r5:00001000 r4:7f037000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb2f000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84f21b8c r4:84f21800 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:84f21b8c r4:84d40980 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ef9800 r8:84d409ac r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d40980 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d40980 r8:8027e8dc r7:dfd35e60 r6:84d40900 r5:84ef9800 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe65fb0 to 0xdfe65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84eaf780 INFO: task kworker/1:84:4164 is blocked on a mutex likely owned by task kworker/1:69:4104. task:kworker/1:69 state:R running task stack:0 pid:4104 tgid:4104 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf7d8>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8260c9b4 r9:84e12400 r8:80200be4 r7:dfe59d54 r6:ffffffff r5:84e12400 r4:00000000 [<819bf798>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfe59d20 to 0xdfe59d68) 9d20: 81cf0000 ed03d000 00000001 80239a78 7f00b000 00000001 828b51c4 828b45a0 9d40: 7f00b000 ed03d000 8260c9b4 dfe59d9c dfe59da0 dfe59d70 802309b0 80239a90 9d60: 80070013 ffffffff r5:80070013 r4:80239a90 [<8023094c>] (flush_tlb_kernel_range) from [<804e40e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:828b51e4 [<804e3e5c>] (__purge_vmap_area_lazy) from [<804e4498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe59dc0 r5:dfe59e08 r4:dfe59dc0 [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ebc380 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:84e12400 r7:00000000 r6:82c18200 r5:00001000 r4:7f061000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe3d000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8418638c r4:84186000 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:8418638c r4:84d41480 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e12400 r8:84d414ac r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d41480 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d41480 r8:8027e8dc r7:dfd79e60 r6:84eb8880 r5:84e12400 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe59fb0 to 0xdfe59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84ebc440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:85:4165 blocked for more than 431 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:85 state:D stack:0 pid:4165 tgid:4165 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf3a4>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<819be41c>] (__schedule) from [<819bf3a4>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82718544 r9:dfdadd84 r8:00000002 r7:60000113 r6:dfdadd8c r5:845d6c00 r4:845d6c00 [<819bf378>] (schedule) from [<819bf78c>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:845d6c00 r4:82718540 [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<819c1b70>] (__mutex_lock.constprop.0) from [<819c233c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8260c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdade08 r4:00000000 [<819c2328>] (__mutex_lock_slowpath) from [<819c237c>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<819c2340>] (mutex_lock) from [<804e431c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eb3240 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:845d6c00 r7:00000000 r6:82c18200 r5:00001000 r4:7f02b000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa30000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ca4f8c r4:84ca4c00 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:84ca4f8c r4:84d40a00 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:845d6c00 r8:84d40a2c r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d40a00 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d40a00 r8:8027e8dc r7:dfe65e60 r6:84d40a80 r5:845d6c00 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdadfb0 to 0xdfdadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84eaf780 INFO: task kworker/1:85:4165 is blocked on a mutex likely owned by task kworker/1:69:4104. task:kworker/1:69 state:R running task stack:0 pid:4104 tgid:4104 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf7d8>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8260c9b4 r9:84e12400 r8:80200be4 r7:dfe59d54 r6:ffffffff r5:84e12400 r4:00000000 [<819bf798>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfe59d20 to 0xdfe59d68) 9d20: 81cf0000 ed03d000 00000001 80239a78 7f00b000 00000001 828b51c4 828b45a0 9d40: 7f00b000 ed03d000 8260c9b4 dfe59d9c dfe59da0 dfe59d70 802309b0 80239a90 9d60: 80070013 ffffffff r5:80070013 r4:80239a90 [<8023094c>] (flush_tlb_kernel_range) from [<804e40e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:828b51e4 [<804e3e5c>] (__purge_vmap_area_lazy) from [<804e4498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe59dc0 r5:dfe59e08 r4:dfe59dc0 [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ebc380 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:84e12400 r7:00000000 r6:82c18200 r5:00001000 r4:7f061000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe3d000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8418638c r4:84186000 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:8418638c r4:84d41480 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e12400 r8:84d414ac r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d41480 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d41480 r8:8027e8dc r7:dfd79e60 r6:84eb8880 r5:84e12400 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe59fb0 to 0xdfe59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84ebc440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:52:4168 blocked for more than 431 seconds. Not tainted 6.16.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:52 state:D stack:0 pid:4168 tgid:4168 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf3a4>] (__schedule_loop kernel/sched/core.c:6864 [inline]) [<819be41c>] (__schedule) from [<819bf3a4>] (schedule+0x2c/0x130 kernel/sched/core.c:6879) r10:82718544 r9:dfa69d84 r8:00000002 r7:60000013 r6:dfa69d8c r5:84ee2400 r4:84ee2400 [<819bf378>] (schedule) from [<819bf78c>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6936) r5:84ee2400 r4:82718540 [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<819bf774>] (schedule_preempt_disabled) from [<819c1e70>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<819c1b70>] (__mutex_lock.constprop.0) from [<819c233c>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8260c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa69e08 r4:00000000 [<819c2328>] (__mutex_lock_slowpath) from [<819c237c>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<819c2340>] (mutex_lock) from [<804e431c>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2912) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eafe00 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18005 r8:84ee2400 r7:00000000 r6:82c18000 r5:00001000 r4:7f035000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb0d000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84f2178c r4:84f21400 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:82c18000 r5:84f2178c r4:84ec0f80 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ee2400 r8:84ec0fac r7:82604d40 r6:dddced40 r5:dddced60 r4:84ec0f80 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ec0f80 r8:8027e8dc r7:dfcb9e60 r6:84d40b00 r5:84ee2400 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa69fb0 to 0xdfa69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84c1ed80 INFO: task kworker/0:52:4168 is blocked on a mutex likely owned by task kworker/1:69:4104. task:kworker/1:69 state:R running task stack:0 pid:4104 tgid:4104 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<819be41c>] (__schedule) from [<819bf7d8>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7109) r10:8260c9b4 r9:84e12400 r8:80200be4 r7:dfe59d54 r6:ffffffff r5:84e12400 r4:00000000 [<819bf798>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfe59d20 to 0xdfe59d68) 9d20: 81cf0000 ed03d000 00000001 80239a78 7f00b000 00000001 828b51c4 828b45a0 9d40: 7f00b000 ed03d000 8260c9b4 dfe59d9c dfe59da0 dfe59d70 802309b0 80239a90 9d60: 80070013 ffffffff r5:80070013 r4:80239a90 [<8023094c>] (flush_tlb_kernel_range) from [<804e40e0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2336) r4:828b51e4 [<804e3e5c>] (__purge_vmap_area_lazy) from [<804e4498>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2951) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfe59dc0 r5:dfe59e08 r4:dfe59dc0 [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vm_reset_perms mm/vmalloc.c:3343 [inline]) [<804e42b4>] (_vm_unmap_aliases) from [<804e820c>] (vfree+0x16c/0x210 mm/vmalloc.c:3422) r10:82c16070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ebc380 r4:00000000 [<804e80a0>] (vfree) from [<8054627c>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:82c18205 r8:84e12400 r7:00000000 r6:82c18200 r5:00001000 r4:7f061000 [<8054624c>] (execmem_free) from [<803c6018>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe3d000 [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6008>] (bpf_jit_free_exec) from [<803c63f8>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6390>] (bpf_jit_free) from [<803c7484>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8418638c r4:84186000 [<803c7338>] (bpf_prog_free_deferred) from [<8027de90>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:82c18200 r5:8418638c r4:84d41480 [<8027dcdc>] (process_one_work) from [<8027ead8>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027dcdc>] (process_one_work) from [<8027ead8>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e12400 r8:84d414ac r7:82604d40 r6:ddde2d40 r5:ddde2d60 r4:84d41480 [<8027e8dc>] (worker_thread) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d41480 r8:8027e8dc r7:dfd79e60 r6:84eb8880 r5:84e12400 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe59fb0 to 0xdfe59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:84ebc440 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.16.0-rc6-syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Call trace: [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:00000000 r6:00000013 r5:60000093 r4:82036490 [<80201ae4>] (show_stack) from [<8021f79c>] (__dump_stack lib/dump_stack.c:94 [inline]) [<80201ae4>] (show_stack) from [<8021f79c>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:120) [<8021f72c>] (dump_stack_lvl) from [<8021f7c0>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r5:00000000 r4:00000001 [<8021f7a8>] (dump_stack) from [<819a83d8>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113) [<819a8278>] (nmi_cpu_backtrace) from [<819a8524>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000000 r6:8260c690 r5:8261aec0 r4:ffffffff [<819a83f4>] (nmi_trigger_cpumask_backtrace) from [<802303bc>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:852) r9:8260c80c r8:828a9564 r7:8261baa8 r6:00007904 r5:8261b488 r4:859f660c [<802303a4>] (arch_trigger_cpumask_backtrace) from [<8037fca0>] (trigger_all_cpu_backtrace include/linux/nmi.h:158 [inline]) [<802303a4>] (arch_trigger_cpumask_backtrace) from [<8037fca0>] (check_hung_uninterruptible_tasks kernel/hung_task.c:307 [inline]) [<802303a4>] (arch_trigger_cpumask_backtrace) from [<8037fca0>] (watchdog+0x4a8/0x750 kernel/hung_task.c:470) [<8037f7f8>] (watchdog) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:8037f7f8 r7:82ccb500 r6:82ccb500 r5:82e46c00 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:82fa3940 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 2732 Comm: pr/ttyAMA0 Not tainted 6.16.0-rc6-syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express PC is at __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 kernel/locking/spinlock.c:194 LR is at spin_unlock_irqrestore include/linux/spinlock.h:406 [inline] LR is at __uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline] LR is at pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603 pc : [<819c7918>] lr : [<80a449f8>] psr: 60000013 sp : eb85deb0 ip : eb85dec0 fp : eb85debc r10: 82757e3c r9 : 00000001 r8 : 00000000 r7 : 00000117 r6 : 82757da0 r5 : 00000000 r4 : 00000001 r3 : 00000e0a r2 : 00000000 r1 : 60000013 r0 : 84159440 Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none Control: 30c5387d Table: 84d8a980 DAC: 00000000 Call trace: [<819c78f0>] (_raw_spin_unlock_irqrestore) from [<80a449f8>] (spin_unlock_irqrestore include/linux/spinlock.h:406 [inline]) [<819c78f0>] (_raw_spin_unlock_irqrestore) from [<80a449f8>] (__uart_port_unlock_irqrestore include/linux/serial_core.h:616 [inline]) [<819c78f0>] (_raw_spin_unlock_irqrestore) from [<80a449f8>] (pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603) [<80a449d8>] (pl011_console_device_unlock) from [<802e79d4>] (nbcon_emit_one+0x80/0xf8 kernel/printk/nbcon.c:1123) [<802e7954>] (nbcon_emit_one) from [<802e7bf4>] (nbcon_kthread_func+0x1a8/0x2a4 kernel/printk/nbcon.c:1210) r6:8260c690 r5:841a5400 r4:82757da0 [<802e7a4c>] (nbcon_kthread_func) from [<80285b04>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:82757da0 r8:802e7a4c r7:8411bc00 r6:8411bc00 r5:841a5400 r4:00000001 [<802859d8>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb85dfb0 to 0xeb85dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802859d8 r4:82fd02c0